In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?
Answer(s): A
Ring topology is a type of physical network design where all computers in the network are connected in a closed loop. Each computer or device in a Ring topology network acts as a repeater. It transmits data by passing a token around the network in order to prevent the collision of data between two computers that want to send messages at the same time. If a token is free, the computer waiting to send data takes it, attaches the data and destination address to the token, and sends it.When the token reaches its destination computer, the data is copied. Then, the token gets back to the originator. The originator finds that the message has been copied and received and removes the message from the token. Now, the token is free and can be used by the other computers in the network to send data. In this topology, if one computer fails, the entire network goes down.
You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm.Which of the following should you choose?
Answer(s): B
Secure Hash Algorithm (SHA) is a well known, widely used, and highly secure hashing algorithm designed by the National Security Agency.
Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?
A man-trap in modern physical security protocols refers to a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens. Identification may be required for each door, and possibly different measures for each door. For example, a key may open the first door, but a personal identification number entered on a number pad opens the second. Other methods of opening doors include proximity cards or biometric devices such as fingerprint readers or iris recognition scans. "Man-traps" may be configured so that when an alarm is activated, all doors lock and trap the suspect between the doors in the "dead-space" or lock just one door to deny access to a secure space such as a data center or research lab. Answer options C, D, and B are incorrect. HIDS, biometric devices, and NIDS cannot be configured to catch the suspect or intruder between the doors in the dead-space.
Which of the following refers to a location away from the computer center where document copies and backup media are kept?
Off-site storage refers to a location away from the computer center where documents copies and backup media are kept. This storage method is more secure but less convenient and more costly.Answer option C is incorrect. Onsite storage refers to the same location where the work place is. It is considered more convenient but less secure in case of disaster.Answer option A is incorrect. A storage area network (SAN) is an architecture to attach remote computer storage devices (such as disk arrays,tape libraries, and optical jukeboxes) to servers in such a way that the devices appear as locally attached to the operating system.Answer option D is incorrect. Network attached storage (NAS), in contrast to SAN, uses file-based protocols such as NFS or SMB/CIFS where it is clear that the storage is remote, and computers request a portion of an abstract file rather than a disk block.
Post your Comments and Discuss ISC2 ISSAP exam with other Community members:
Terry commented on May 24, 2023 i can practice for exam Anonymous upvote
Rahul Kumar commented on August 31, 2023 need certification. CANADA upvote
Terry commented on May 24, 2023 I can practice for exam Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the ISSAP content, but please register or login to continue.