Free ISSAP Exam Braindumps (page: 26)

Page 26 of 61

Which of the following encryption algorithms are based on block ciphers?

  1. RC4
  2. Twofish
  3. Rijndael
  4. RC5

Answer(s): B,C,D

Explanation:

The following encryption algorithms are based on block ciphers:
RC5
Rijndael
Twofish
In cryptography, a block cipher is a symmetric key cipher which operates on fixed-length groups of bits, termed as 'blocks', with an unvarying transformation.
When encrypting, a block cipher might take (for example) a 128-bit block of plain text as input, and output a corresponding 128-bit block of cipher text.



Adam works as a Network Administrator. He discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic.
Which of the following types of authentication mechanism is used here?

  1. Pre-shared key authentication
  2. Open system authentication
  3. Shared key authentication
  4. Single key authentication

Answer(s): C

Explanation:

Shared key authentication is an authentication method specified in the 802.11 standard.
In this authentication, a static WEP key should be configured on the client. The shared key authentication has the following processes:
1.The client makes a request to the access point for shared key authentication by sending an authentication request.
2.The access point sends authentication response to the client. Authentication response contains challenge text in a clear text format.
3.The client uses its locally configured WEP key to encrypt the challenge text and replies with a subsequent authentication request.
4.If the access point can decrypt the authentication request and retrieve the original challenge text, then it responds with an authentication response that allows the client to access the network.



The OSI model is the most common networking model used in the industry. Applications, network functions, and protocols are typically referenced using one or more of the seven OSI layers. Of the following, choose the two best statements that describe the OSI layer functions. Each correct answer represents a complete solution. Choose two.

  1. Layers 1 and 2 deal with application functionality and data formatting. These layers reside at the top of the model.
  2. Layers 4 through 7 define the functionality of IP Addressing, Physical Standards, and Data Link protocols.
  3. Layers 5, 6, and 7 focus on the Network Application, which includes data formatting and session control.
  4. Layers 1, 2, 3, and 4 deal with physical connectivity, encapsulation, IP Addressing, and Error Recovery. These layers define the end-to-end functions of data delivery.

Answer(s): C,D

Explanation:

Layers 1, 2, 3, and 4 deal with physical connectivity, encapsulation, IP Addressing, and Error Recovery. These layers define the end-to-end functions of data delivery. Layers 5, 6, and 7 focus on the Network Application, which includes data formatting and session control.
Answer option A is incorrect. Layers 1 and 2 deal with Physical Connectivity and Data Link functions.

Answer option B is incorrect. Layers 4 through 7 are upper OSI model layers and deal with functions of application, presentation, session, and transport.



Which of the following is the technology of indoor or automotive environmental comfort?

  1. HIPS
  2. HVAC
  3. NIPS
  4. CCTV

Answer(s): B

Explanation:

HVAC stands for the closely related functions of "Heating, Ventilating, and Air Conditioning". It is the technology of indoor or automotive environmental comfort. HVAC system design is a major sub-discipline of mechanical engineering, based on the principles of thermodynamics,
fluid mechanics, and heat transfer.
HVAC is particularly important in the design of medium to large industrial and office buildings such as skyscrapers and in marine environments such as aquariums, where safe and healthy building conditions are regulated with temperature and humidity, as well as "fresh air" from outdoors.
Answer option A is incorrect. A host-based intrusion prevention system (HIPS) is an application usually employed on a single computer. It complements traditional finger-print-based and heuristic antivirus detection methods, since it does not need continuous updates to stay ahead of new malware.
When a malicious code needs to modify the system or other software residing on the machine, a HIPS system will notice some of the resulting changes and prevent the action by default or notify the user for permission. It can handle encrypted and unencrypted traffic equally and cannot detect events scattered over the network. Answer option D is incorrect. Closed-circuit television (CCTV) is a device that uses video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point to point wireless links. CCTV is often used for surveillance in areas that may need monitoring such as banks, casinos, airports, military installations, and convenience stores.
Answer option C is incorrect. Network intrusion prevention system (NIPS) is a hardware/software platform that is designed to analyze, detect,
and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop malicious traffic. NIPS is able to detect events scattered over the network and can react.



Page 26 of 61



Post your Comments and Discuss ISC2 ISSAP exam with other Community members:

Terry commented on May 24, 2023
i can practice for exam
Anonymous
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Terry commented on May 24, 2023
I can practice for exam
Anonymous
upvote