Free ISSAP Exam Dumps

Question 31

- (Exam Topic 2)
Which of the following protocols supports encapsulation of encrypted packets in secure wrappers that can be transmitted over a TCP/IP connection?

Correct Answer:A

Question 32

- (Exam Topic 2)
Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?

Correct Answer:D

Question 33

- (Exam Topic 2)
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.

Correct Answer:CD

Question 34

- (Exam Topic 2)
Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

Correct Answer:D

Question 35

- (Exam Topic 2)
Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?

Correct Answer:D