PrepAway - Latest Free Exam Questions & Answers

Category: CISSP-ISSAP

Exam CISSP-ISSAP: ISSAP Information Systems Security Architecture Professional

Which of the following cryptographic algorithms is being used by the We-are-secure server?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to
a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is
using does not thenticate participants. Which of the following cryptographic algorithms is being
used by the We-are-secure server?

Which of the following phases of the Incident handling process should you follow next to handle this incident?

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process
to handle the events and incidents. You identify Denial of Service attack (DOS) from a network
linked to your internal enterprise network. Which of the following phases of the Incident handling
process should you follow next to handle this incident?


Page 4 of 24« First...23456...1020...Last »