Free ISSAP Exam Braindumps (page: 31)

Page 31 of 61

Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.

  1. RADIUS
  2. TACACS+
  3. Media Access control
  4. Peer-to-Peer

Answer(s): A,B

Explanation:

The following are the centralized administration technologies:
TACACS+
RADIUS



You are implementing some security services in an organization, such as smart cards, biometrics, access control lists, firewalls, intrusion detection systems, and clipping levels.
Which of the following categories of implementation of the access control includes all these security services?

  1. Administrative access control
  2. Logical access control
  3. Physical access control
  4. Preventive access control

Answer(s): B

Explanation:

Logical access control includes hardware and software mechanisms that are used to manage access to resources and systems and offer protection for these resources and systems. It is also known as technical access control. Logical or technical access control has the following security services:
Encryption
Smart cards
Passwords
Biometrics
Constrained interfaces
Access control lists
Firewalls
Routers
Intrusion detection systems
Clipping levels



You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the company.
Which of the following devices will you use to physically connect the computers in the VLAN?
Each correct answer represents a complete solution. Choose two.

  1. Switch
  2. Router
  3. Bridge
  4. Hub
  5. Repeater

Answer(s): A,B

Explanation:

In order to configure a VLAN, switches are used to physically connect the computers.

VLAN is a technique to convert internetwork into a large LAN. For internetworking, routers are used to connect LANs at the network layer of the OSI model.
For creating VLAN, these routers are replaced with switches that create data-link layer connections. As a switch forwards incoming traffic only to the computers for which it is destined, the full bandwidth of the network medium is used. Moreover, the number of collisions on the network remains low to improve the overall efficiency.



Which of the following protocols work at the Network layer of the OSI model?

  1. Routing Information Protocol (RIP)
  2. File Transfer Protocol (FTP)
  3. Simple Network Management Protocol (SNMP)
  4. Internet Group Management Protocol (IGMP)

Answer(s): A,D

Explanation:

The following protocols of the OSI model work at the Network layer:
Routing Information Protocol (RIP)
Internet Group Management Protocol (IGMP)



Page 31 of 61



Post your Comments and Discuss ISC2 ISSAP exam with other Community members:

Terry commented on May 24, 2023
i can practice for exam
Anonymous
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Terry commented on May 24, 2023
I can practice for exam
Anonymous
upvote