Question 31

- (Exam Topic 2)
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you want to discuss it with your team members for getting appropriate responses of the disaster. In which of the following disaster recovery tests can this task be performed?

Correct Answer:C

Question 32

- (Exam Topic 1)
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

Correct Answer:A

Question 33

- (Exam Topic 2)
Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

Correct Answer:C

Question 34

- (Exam Topic 1)
Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message?

Correct Answer:A

Question 35

- (Exam Topic 2)
Which of the following decides access control on an object in the mandatory access control (MAC) environment?

Correct Answer:A

Question 36

- (Exam Topic 1)
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?

Correct Answer:A

START ISSAP EXAM