Question 19

- (Exam Topic 1)
Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Correct Answer:A

Question 20

- (Exam Topic 1)
John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?

Correct Answer:B

Question 21

- (Exam Topic 2)
Which of the following life cycle modeling activities establishes service relationships and message exchange paths?

Correct Answer:A

Question 22

- (Exam Topic 2)
Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?

Correct Answer:A

Question 23

- (Exam Topic 2)
Access control systems enable an authority to control access to areas and resources in a given physical facility or computer-based information system. Which of the following services provided by access control systems is used to determine what a subject can do?

Correct Answer:B

Question 24

- (Exam Topic 2)
Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BCD

START ISSAP EXAM