Free ISSAP Exam Braindumps (page: 33)

Page 33 of 61

Which of the following heights of fence deters only casual trespassers?

  1. 8 feet
  2. 3 to 4 feet
  3. 2 to 2.5 feet
  4. 6 to 7 feet

Answer(s): B

Explanation:

Fences having a height of 3 to 4 feet can deter casual trespassers. Answer option D is incorrect. Fences having a height of 6 to 7 feet are considered too difficult to climb.
Answer option C is incorrect. Fences having a height of 2 to 2.5 feet can be easily crossed. Hence, this will not act as a deterrent.
Answer option A is incorrect. Fences having a height of 8 feet should be used to prevent a determined intruder.



In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

  1. Chosen plaintext attack
  2. Ciphertext only attack
  3. Chosen ciphertext attack
  4. Known plaintext attack

Answer(s): B

Explanation:

In a ciphertext only attack, an attacker obtains encrypted messages that have been encrypted using the same encryption algorithm.



Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

  1. Safeguard
  2. Annualized Rate of Occurrence (ARO)
  3. Single Loss Expectancy (SLE)
  4. Exposure Factor (EF)

Answer(s): B

Explanation:

which a threat is expected to occur. It is calculated based upon the probability of the event occurring and the number of employees that could make that event occur.
Answer option D is incorrect. The Exposure Factor (EF) represents the % of assets loss caused by a threat. The EF is required to calculate the Single Loss Expectancy (SLE).
Answer option C is incorrect. The Single Loss Expectancy (SLE) is the value in dollars that is assigned to a single event.
SLE = Asset Value ($) X Exposure Factor (EF) Answer option A is incorrect. Safeguard acts as a countermeasure for reducing the risk associated with a specific threat or a group of threats.



You work as a Chief Security Officer for Tech Perfect Inc. The company has a TCP/IP based network. You want to use a firewall that can track the state of active connections of the network and then determine which network packets are allowed to enter through the firewall.
Which of the following firewalls has this feature?

  1. Stateful packet inspection firewall
  2. Proxy-based firewall
  3. Dynamic packet-filtering firewall
  4. Application gateway firewall

Answer(s): C

Explanation:

A dynamic packet-filtering firewall is a fourth generation firewall technology. It is also known as a stateful firewall. The dynamic packet-filtering firewall tracks the state of active connections and then determines which network packets are allowed to enter through the firewall. It records session information such as IP addresses and port numbers to implement a more secure network.
The dynamic packet-filtering firewall operates at Layer3, Layer4, and Layer5.
Answer option D is incorrect. An application gateway firewall applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose performance degradation. It allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, BitTorrent, SIP, RTSP, file transfer in IM applications, etc. It works on the application layer. Answer option A is incorrect. Stateful packet inspection (SPI) is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known connection state will be allowed by the firewall; others will be rejected.
Answer option B is incorrect. A proxy-based firewall running either on a dedicated hardware or as software on a general-purpose machine responds to input packets in the manner of an application, whilst blocking other packets. Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall. Conversely, intruders may hijack a publicly-reachable system and use it as a proxy for their own purposes; the proxy then masquerades as that system to other internal machines.
While use of internal address spaces enhances security, attackers may still employ methods such as IP spoofing to attempt to pass packets to a target network. The proxy firewall functions by maintaining two separate conversations, which are as follows:
One between the client and the firewall
One between the firewall and the end server



Page 33 of 61



Post your Comments and Discuss ISC2 ISSAP exam with other Community members:

Terry commented on May 24, 2023
i can practice for exam
Anonymous
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Terry commented on May 24, 2023
I can practice for exam
Anonymous
upvote