Free ISSAP Exam Braindumps (page: 19)

Page 19 of 61

You want to connect a twisted pair cable segment to a fiber-optic cable segment.
Which of the following networking devices will you use to accomplish the task?

  1. Hub
  2. Switch
  3. Repeater
  4. Router

Answer(s): C

Explanation:

A repeater is a basic LAN connection device. It allows a network cabling system to extend beyond its maximum allowed length and reduces distortion by amplifying or regenerating network signals. Repeaters can also be used to connect network segments composed of different media, such as to connect a twisted pair cable segment to a fiber-optic cable segment. A repeater works at the physical layer of the OSI model.
Answer option A is incorrect. A hub is a device used to link computers in a network. It connects computers that have a common architecture, such as Ethernet, ARCnet, FDDI, or Token Ring. All hub-computer connections for a particular network use the same type of cable, which can be twisted-pair, coaxial, or fiber-optic. Hubs are generally used in star topology networks. Token Ring hubs are also known as Multistation Access Units (MSAUs). A hub works on the physical layer of the OSI model. Answer option B is incorrect. A switch is a network connectivity device that brings media segments together in a central location. It reads the destination's MAC address or hardware address from each incoming data packet and forwards the data packet to its destination. This reduces the network traffic. Switches operate at the data-link layer of the OSI model. Answer option D is incorrect. Router is a device that routes data packets between computers in different networks. It is used to connect multiple networks, and it determines the path to be taken by each data packet to its destination computer. Router maintains a routing table of the available routes and their conditions. By using this information, along with distance and cost algorithms, the router determines the best path to be taken by the data packets to the destination computer. A router can connect dissimilar networks, such as Ethernet, FDDI, and
Token Ring, and route data packets among them. Routers operate at the network layer (layer 3) of the Open Systems Interconnection (OSI) model.



In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers.
What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.

  1. Public-key cryptography
  2. Kerberos
  3. Preshared keys
  4. Digital certificates

Answer(s): B,C,D

Explanation:

Three authentication methods are supported in Windows 2003 implementation of IPSec:
Kerberos
Digital certificates
Preshared keys
Answer option A is incorrect. It is not supported in Windows 2003 implementation of IPSec.



The security controls that are implemented to manage physical security are divided in various groups.
Which of the following services are offered by the administrative physical security control group? Each correct answer represents a part of the solution. Choose all that apply.

  1. Construction and selection
  2. Site management
  3. Awareness training
  4. Access control
  5. Intrusion detection
  6. Personnel control

Answer(s): A,B,C,F

Explanation:

The administrative physical security control group offers the following services:
Construction and selection
Site management
Personnel control
Awareness training
Emergency response and procedure
Answer options E, D are incorrect. Intrusion detection and access control are offered by the technical physical security control group.



Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?
Each correct answer represents a complete solution. Choose two.

  1. Data service
  2. Ticket-granting service
  3. Account service
  4. Authentication service

Answer(s): B,D

Explanation:

Kerberos Key Distribution Center (KDC) consists of the following two components:
Authentication service: This service issues ticket-granting tickets (TGTs) that are good for admission to the ticket-granting service (TGS). Before network clients can get tickets for services, they must obtain a TGT from the authentication service.
Ticket-granting service: This service issues tickets that are used for admission to other services in its own domain or to access the ticket-granting service of a trusted domain.



Page 19 of 61



Post your Comments and Discuss ISC2 ISSAP exam with other Community members:

Terry commented on May 24, 2023
i can practice for exam
Anonymous
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Terry commented on May 24, 2023
I can practice for exam
Anonymous
upvote