Fill in the blank with the appropriate security device. ___________ is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view.
Answer(s): A
A motion detector is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either ntegrated with or connected to other devices that alert the user of the presence of a moving object within the field of view. They form a vital component of comprehensive security systems, for both homes and businesses.
Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?
Answer(s): C
Kerberos uses a Key Distribution Center (KDC) to authenticate a principle. Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Kerberos builds on symmetric key cryptography and requires a trusted third party. Kerberos uses as its basis the Needham-Schroeder protocol. It makes use of a trusted third party, termed a key distribution center (KDC), which consists of two logically separate parts:Authentication Server (AS)Ticket Granting Server (TGS)Kerberos works on the basis of tickets, which serve to prove the identity of users. The KDC maintains a database of secret keys; each entity on the network, whether a client or a server, shares a secret key known only to itself and to the KDC.Knowledge of this key serves to prove an entity's identity. For communication between two entities, the KDC generates a session key, which they can use to secure their interactions.Answer option D is incorrect. Terminal Access Controller Access-Control System (TACACS) is a remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network. TACACS allows a client to accept a username and password and send a query to a TACACS authentication server, sometimes called a TACACS daemon. It uses UDP port 49 as the default port.Answer option A is incorrect. Challenge Handshake Authentication Protocol (CHAP) is an authentication protocol that uses a secure form of encrypted authentication. Using CHAP, network dial-up connections are able to securely connect to almost all PPP servers.Answer option B is incorrect. Password Authentication Protocol (PAP) is the least sophisticated authentication protocol, used mostly when a client calls a server running an operating system other than Windows. PAP uses plain text passwords.
Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?
Directory service is a network service that stores and organizes information about a computer network's users and network resources, and that allows network administrators to manage users' access to the resources. It identifies all resources on a network and makes them accessible to users and applications. Directory service is physically distributed, logically centralized repository of data that is used to manage a directory. It provides rules-based access to the data stored within the directory. Answer option B is incorrect. Terminal Services provides multi-session environment that allows remote computers to access Windows-based programs running on a server.Answer option A is incorrect. The Simple Mail Transport Protocol (SMTP) service is used for transferring e-mails between the intranet and the Internet.Answer option D is incorrect. The Distributed File System (DFS) service is used to manage logical volumes distributed across a local or wide area network. It permits the linking of servers and shares into a simpler, more meaningful name space. Dfs provides improved load sharing and data availability.
You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data.Which of the following options will you choose to accomplish this?
The backup policy of the company requires high security and easy recovery of data. Therefore, you should take a full backup daily with the previous night's tape taken offsite. Full backup is a good choice because it makes data restoration easier as compared to differential or incremental backup. For safe storage, a backup tape less than twenty-four hours old should be kept offsite.
Post your Comments and Discuss ISC2 ISSAP exam with other Community members:
Terry commented on May 24, 2023 i can practice for exam Anonymous upvote
Rahul Kumar commented on August 31, 2023 need certification. CANADA upvote
Terry commented on May 24, 2023 I can practice for exam Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the ISSAP content, but please register or login to continue.