PrepAway - Latest Free Exam Questions & Answers

Category: ISSAP

Exam ISSAP: ISC2 Information Systems Security Architecture Professional

Which of the following cryptographic algorithms is being used by the Weare-secure server?

John works as a professional Ethical Hacker. He has been assigned the project of testing the security
of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-inthe-middle attack since the key exchange process of the cryptographic algorithm it is using does not
thenticate participants. Which of the following cryptographic algorithms is being used by the Weare-secure server?

Which of the following phases of the Incident handling process should you follow next to handle this incident?

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process
to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked
to your internal enterprise network. Which of the following phases of the Incident handling process
should you follow next to handle this incident?


Page 4 of 25« First...23456...1020...Last »