Free ISSAP Exam Braindumps (page: 14)

Page 14 of 61

Access controls are divided into three different categories. Place the appropriate security services in their corresponding categories.

  1. See below Exhibit for answer.

Answer(s): A

Explanation:

The various security services with their corresponding categories are as follows:
Preventive access control:
Fence
Security policy
Security awareness training
Antivirus software
Detective access control:
Security guard
Supervising user
Incident investigation
Intrusion detection system
Corrective access control:
Alarm
Mantrap
Security policy



Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

  1. Estimate the potential losses to assets by determining their value.
  2. Establish the threats likelihood and regularity.
  3. Valuations of the critical assets in hard costs.
  4. Evaluate potential threats to the assets.

Answer(s): A,B,D

Explanation:

The main steps of performing risk analysis are as follows:
Estimate the potential losses to the assets by determining their value.
Evaluate the potential threats to the assets.
Establish the threats probability and regularity.



Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?

  1. IPSec
  2. L2TP
  3. LEAP
  4. ISAKMP

Answer(s): D

Explanation:

ISAKMP (Internet Security Association and Key Management Protocol) is a protocol for establishing Security Associations (SA) and cryptographic keys in an Internet environment. It provides a framework for the negotiation and management of security associations between peers and traverses on UDP/500 port. ISAKMP defines the procedures for authenticating a communicating peer, creation and management of Security Associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks).
ISAKMP defines procedures and packet formats to establish, negotiate, modify, and delete Security Associations. Security Associations contain all information required for execution of various network security services, such as the IP layer services (such as header authentication and payload encapsulation), transport or application layer services, or self-protection of negotiation traffic. ISAKMP defines payloads for exchanging key generation and authentication data.
Answer option A is incorrect. Internet Protocol Security (IPSec) is a standard-based protocol that provides the highest level of VPN security.
IPSec can encrypt virtually everything above the networking layer. It is used for VPN connections that use the L2TP protocol. It secures both data and password.
IPSec cannot be used with Point-to-Point Tunneling Protocol (PPTP). Answer option B is incorrect. Layer 2 Tunneling Protocol (L2TP) is a more secure version of Point-to- Point Tunneling Protocol (PPTP). It provides tunneling, address assignment, and authentication. L2TP allows transfer of Point-to-Point Protocol (PPP) traffic between different networks.
L2TP combines with IPSec to provide both tunneling and security for Internet Protocol (IP), Internetwork Packet Exchange (IPX), and other protocol packets across IP networks.

Answer option C is incorrect. LEAP (Lightweight Extensible Authentication Protocol) is a proprietary wireless LAN authentication method developed by Cisco Systems. Important features of LEAP are dynamic WEP keys and mutual authentication between a wireless client and a RADIUS server. LEAP allows clients to re-authenticate frequently. The clients get a new WEP key upon each successful authentication.



Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key.
Which of the following encryption methods will he use?

  1. Asymmetric encryption
  2. Symmetric encryption
  3. S/MIME
  4. PGP

Answer(s): B

Explanation:

Symmetric encryption is the simplest encryption method that can be implemented in this situation.



Page 14 of 61



Post your Comments and Discuss ISC2 ISSAP exam with other Community members:

Terry commented on May 24, 2023
i can practice for exam
Anonymous
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Terry commented on May 24, 2023
I can practice for exam
Anonymous
upvote