CISSP-ISSAP Dumps

CISSP-ISSAP Free Practice Test

ISC2 CISSP-ISSAP: Information Systems Security Architecture Professional

QUESTION 11

You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?

Correct Answer: B

QUESTION 12

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

Correct Answer: C

QUESTION 13

Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?

Correct Answer: D

QUESTION 14

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

Correct Answer: C

QUESTION 15

You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?

Correct Answer: A