Free ISSAP Exam Braindumps (page: 34)

Page 34 of 61

Fill in the blank with the appropriate security device. ___________ is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view.

  1. Motion detector

Answer(s): A

Explanation:

A motion detector is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either ntegrated with or connected to other devices that alert the user of the presence of a moving object within the field of view. They form a vital component of comprehensive security systems, for both homes and businesses.



Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?

  1. CHAP
  2. PAP
  3. Kerberos
  4. TACACS

Answer(s): C

Explanation:

Kerberos uses a Key Distribution Center (KDC) to authenticate a principle. Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Kerberos builds on symmetric key cryptography and requires a trusted third party. Kerberos uses as its basis the Needham-Schroeder protocol. It makes use of a trusted third party, termed a key distribution center (KDC), which consists of two logically separate parts:
Authentication Server (AS)
Ticket Granting Server (TGS)
Kerberos works on the basis of tickets, which serve to prove the identity of users. The KDC maintains a database of secret keys; each entity on the network, whether a client or a server, shares a secret key known only to itself and to the KDC.
Knowledge of this key serves to prove an entity's identity. For communication between two entities, the KDC generates a session key, which they can use to secure their interactions.
Answer option D is incorrect. Terminal Access Controller Access-Control System (TACACS) is a remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network. TACACS allows a client to accept a username and password and send a query to a TACACS authentication server, sometimes called a TACACS daemon. It uses UDP port 49 as the default port.
Answer option A is incorrect. Challenge Handshake Authentication Protocol (CHAP) is an authentication protocol that uses a secure form of encrypted authentication. Using CHAP, network dial-up connections are able to securely connect to almost all PPP servers.
Answer option B is incorrect. Password Authentication Protocol (PAP) is the least sophisticated authentication protocol, used mostly when a client calls a server running an operating system other than Windows. PAP uses plain text passwords.



Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?

  1. SMTP service
  2. Terminal service
  3. Directory service
  4. DFS service

Answer(s): C

Explanation:

Directory service is a network service that stores and organizes information about a computer network's users and network resources, and that allows network administrators to manage users' access to the resources. It identifies all resources on a network and makes them accessible to users and applications. Directory service is physically distributed, logically centralized repository of data that is used to manage a directory. It provides rules-based access to the data stored within the directory. Answer option B is incorrect. Terminal Services provides multi-session environment that allows remote computers to access Windows-based programs running on a server.
Answer option A is incorrect. The Simple Mail Transport Protocol (SMTP) service is used for transferring e-mails between the intranet and the Internet.
Answer option D is incorrect. The Distributed File System (DFS) service is used to manage logical volumes distributed across a local or wide area network. It permits the linking of servers and shares into a simpler, more meaningful name space. Dfs provides improved load sharing and data availability.



You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data.
Which of the following options will you choose to accomplish this?

  1. Take a full backup daily and use six-tape rotation.
  2. Take a full backup on Monday and a differential backup on each of the following weekdays.
    Keep Monday's backup offsite.
  3. Take a full backup daily with the previous night's tape taken offsite.
  4. Take a full backup on alternate days and keep rotating the tapes.
  5. Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.
  6. Take a full backup daily with one tape taken offsite weekly.

Answer(s): C

Explanation:

The backup policy of the company requires high security and easy recovery of data. Therefore, you should take a full backup daily with the previous night's tape taken offsite. Full backup is a good choice because it makes data restoration easier as compared to differential or incremental backup. For safe storage, a backup tape less than twenty-four hours old should be kept offsite.



Page 34 of 61



Post your Comments and Discuss ISC2 ISSAP exam with other Community members:

Terry commented on May 24, 2023
i can practice for exam
Anonymous
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Rahul Kumar commented on August 31, 2023
need certification.
CANADA
upvote

Terry commented on May 24, 2023
I can practice for exam
Anonymous
upvote