Free ISSAP Exam Braindumps (page: 2)

Page 2 of 61

Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?

  1. ARP
  2. ICMP
  3. TCP
  4. IGMP

Answer(s): D

Explanation:

Internet Group Management Protocol (IGMP) is a communication protocol that multicasts messages and information among all member devices in an IP multicast group. However, multicast traffic is sent to a single MAC address but is processed by multiple hosts. It can be effectively used for gaming and showing online videos. IGMP is vulnerable to network attacks. Answer option B is incorrect. Internet Control Message Protocol (ICMP) is an integral part of IP. It is used to report an error in datagram processing. The Internet Protocol (IP) is used for host-to-host datagram service in a network. The network is configured with connecting devices called gateways.
When an error occurs in datagram processing, gateways or destination hosts report the error to the source hosts through the ICMP protocol. The ICMP messages are sent in various situations, such as when a datagram cannot reach its destination, when the gateway cannot direct the host to send traffic on a shorter route, when the gateway does not have the buffering capacity, etc.
Answer option A is incorrect. Address Resolution Protocol (ARP) is a network maintenance protocol of the TCP/IP protocol suite. It is responsible for the resolution of IP addresses to media access control (MAC) addresses of a network interface card (NIC). The ARP cache is used to maintain a correlation between a MAC address and its corresponding IP address. ARP provides the protocol rules for making this correlation and providing address conversion in both directions. ARP is limited to physical network systems that support broadcast packets.
Answer option C is incorrect. Transmission Control Protocol (TCP) is a reliable, connection-oriented protocol operating at the transport layer of the OSI model. It provides a reliable packet delivery service encapsulated within the Internet Protocol (IP). TCP guarantees the delivery of packets, ensures proper sequencing of data, and provides a checksum feature that validates both the packet header and its data for accuracy. If the network corrupts or loses a TCP packet during transmission, TCP is responsible for retransmitting the faulty packet. It can transmit large amounts of data. Application-layer protocols, such as HTTP and FTP, utilize the services of TCP to transfer files between clients and servers.



Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

  1. Sensor
  2. Alarm
  3. Motion detector
  4. Badge

Answer(s): D

Explanation:

A badge is a device or accoutrement that is presented or displayed to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification. It is also used in advertising, publicity, and for branding purposes.
A badge can be made from metal, plastic, leather, textile, rubber, etc., and it is commonly attached to clothing, bags, footwear, vehicles, home electrical equipment, etc.
Answer option A is incorrect. A sensor is a device that measures a physical quantity and converts it into a signal that can be read by an observer or by an instrument.
Answer option C is incorrect. A motion detector is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view.
They form a vital component of comprehensive security systems, for both homes and businesses. Answer option B is incorrect. An alarm is a device that triggers a deterrent, a repellent, and a notification.



Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message?

  1. Cipher
  2. CrypTool
  3. Steganography
  4. MIME

Answer(s): A

Explanation:

A cipher is a cryptographic algorithm that performs encryption or decryption. It is a series of well-defined steps that can be followed as a procedure. The cipher transforms a message into a masked form, together with a way of undoing the transformation to recover the message.
When using a cipher the original information is known as plaintext, and the encrypted form as ciphertext. The ciphertext message contains all the information of the plaintext message, but it is not in a readable format. The operation of a cipher usually depends on a piece of auxiliary information, called a key or a cryptovariable. The encrypting procedure is varied depending on the key, which changes the detailed operation of the algorithm. A key must be selected before using a cipher to encrypt a message. Without knowledge of the key, it is impossible to decrypt the ciphertext into plaintext. Answer option B is incorrect. CrypTool is free software and an e-learning tool illustrating cryptographic concepts.
Answer option C is incorrect. Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
Answer option D is incorrect. MIME stands for Multipurpose Internet Mail Extensions. It is a standard for multi-part, multimedia electronic mail messages and World Wide Web hypertext documents on the Internet. MIME provides a mechanism for exchanging non-text information, such as binary data, audio data, video data, and foreign language text that cannot be represented in ASCII text.



Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them.
Which of the following access control models will he use?

  1. Policy Access Control
  2. Mandatory Access Control
  3. Discretionary Access Control
  4. Role-Based Access Control

Answer(s): D

Explanation:

Role-based access control (RBAC) is an access control model. In this model, a user can access resources according to his role in the organization. For example, a backup administrator is responsible for taking backups of important data. Therefore, he is only authorized to access this data for backing it up. However, sometimes users with different roles need to access the same resources. This situation can also be handled using the RBAC model.
Answer option B is incorrect. Mandatory Access Control (MAC) is a model that uses a predefined set of access privileges for an object of the system. Access to an object is restricted on the basis of the sensitivity of the object and granted through authorization. Sensitivity of an object is defined by the label assigned to it. For example, if a user receives a copy of an object that is marked as "secret", he cannot grant permission to other users to see this object unless they have the appropriate permission. Answer option C is incorrect. DAC is an access control model. In this model, the data owner has the right to decide who can access the data.
This model is commonly used in PC environment. The basis of this model is the use of Access Control List (ACL).
Answer option A is incorrect. There is no such access control model as Policy Access Control.



Page 2 of 61



Post your Comments and Discuss ISC2 ISSAP exam with other Community members:

Terry commented on May 24, 2023
i can practice for exam
Anonymous
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Terry commented on May 24, 2023
I can practice for exam
Anonymous
upvote