PrepAway - Latest Free Exam Questions & Answers

Category: ISSAP

Exam ISSAP: ISC2 Information Systems Security Architecture Professional

Which of the following authentication methods will you suggest?

A company named Money Builders Inc., hires you to provide consultancy for setting up their Windows
network. The company’s server room will be in a highly secured environment. You are required to
suggest an authentication method for it. The CFO of the company wants the server to use thumb
impressions for authentication. Which of the following authentication methods will you suggest?

Which of the following is violated in a shoulder surfing attack?

Shoulder
surfing is a type of in-person attack in which the attacker gathers information about the premises of
an organization. This attack is often performed by looking surreptitiously at the keyboard of an
employee’s computer while he is typing in his password at any access point such as a terminal/Web
site. Which of the following is violated in a shoulder surfing attack?

Which of the following documents will be useful for you as well as public relations personnel…?

You
work as a Security Manager for Tech Perfect Inc. A number of people are involved with you in the
DRP efforts. You have maintained several different types of plan documents, intended for different
audiences. Which of the following documents will be useful for you as well as public relations
personnel who require a non-technical perspective on the entire organization’s disaster recovery
efforts?


Page 16 of 25« First...10...1415161718...Last »