|CompTIA ISS-001 : IntelÂ® Server Specialist Certification Exam||218 Questions & Answers||Updated: May 30,19|
Immediate access to the CompTIA ISS-001 Exam and 1800+ other exam PDFs.
This is the BEST deal at only $149.00 for unlimited access. Pass FAST with actual answers to actual questions - We Guarantee You Pass!
Both of our Exams Packages come with all of our CompTIA Exams including all ActualTests ISS-001 tests. Find the same core area CompTIA questions with professionally verified answers, and PASS YOUR EXAM.
Option 1: ISS-001 exam and 1,800+ Other Exams
OR - Upgrade the Unlimited Access Package to include our Exam Engine. Know more than just the answers, understand the solutions! There is an Exam Engine for each of the 1,800 tests, including CompTIA ISS-001. Why Upgrade?
Option 2: ISS-001 exam, 1,800+ Other Exams PLUS Exam Engine
ActualTests ISS-001 Exam Engine Features
Customize your IntelÂ® Server Specialist Certification Exam certification experience.
CompTIA ISS-001 Exam Tips
Which of the following must the implementation of access control devices and technologies reflect?
A. The organization's ACLs (Access Control List).
B. The organization's access control matrixes.
C. The organization's information security policies. (correct)
D. The organization's internal control procedures.
The CSO of a company usually drafts a policy on information security, which should reflect management's attitude towards security and productivity.
What type of detection entails the tracking of personnel who visit unauthorized web sites?
A. Abusive detection.
B. Misuse detection. (correct)
C. Anomaly detection.
D. Site filtering.
Detection systems fall under two categories; anomaly detection and misuse detection. If network behavior use deviates from normal use it's an anomaly. If behavior matches a known scenario, it's misuse. If a company knows their employees are visiting unauthorized pornographic web sites, and they want to detect that 'known' behavior they are in need of misuse detection.
Which of the following would an attacker NOT be concerned with when searching through trash?
A. An IP (Internet Protocol) address.
B. System configuration or network map.
C. Old passwords.
D. System access requests. (correct)
System access requests don't reveal too much information. They are a card that an employee fills that requests the types of resources they want access to, and the privileges they want. All a hacker can learn from them is that from the moment the request was dated, that particular user did not have those privilegesIncorrect answers:A document that contains any clues to a company's internal or external addressing scheme or a configuration or system map is of value because they are all hard clues that can help a hacker 'blueprint' the network structure. Old passwords also have value to them, because they give a hacker a glimpse at password characteristics. (How many characters? Are dictionary words used? How often are passwords changed? Does the administrator or the user choose them?)
What should a system administrator do first on discovering suspicious activity that might indicate a computer crime?
A. Refer to the company's incident response plan. (correct)
B. Change ownership of any related files to prevent tampering.
C. Move any related programs and files to non-erasable media.
D. Set the system time to ensure any logged information is accurate.
For the sake of containment and awareness, whenever an administrator discovers suspicious activity, before making a move he should refer to the company's incident response plan, since different security policies require different plans of attack.
What is the best way to ensure that a multitude of users change their passwords on logon?
A. This can be accomplished by forcing the change by security group.
B. This can be accomplished by forcing the change with group policy. (correct)
C. This can be accomplished by forcing the change with registry editor.
D. This can be accomplished by forcing the change with remote logon.
What will lower the level of security of a network when password rules are set?
A. The level of security will be less when passwords are set to expire at regular intervals as well as users needing to select new passwords not used before.
B. The level of security will be less when passwords are greater than six characters as well as containing one non-alpha.
C. The level of security will be less when the administrators randomly create and issue complex passwords that the user is unable to remotely change. (correct)
D. The level of security will be less when the server lock out any user accounts after a set number of failed attempts forcing the user to call the administrator to re-enable the account.
Identify the document new staff should sign that illustrates the methods of and purposes for accessing the IT systems of the company?
A. The Privacy Act of 1974 describes this document.
B. The Authorized Access Policy describes this document.
C. The Due diligence form describes this document.
D. The Acceptable Use Policy describes this document. (correct)
You are employed as the security administrator at TestKing.com. You have been informed that a staff member's contract expired. What should you do?
A. Your best option would be to change the password of the staff member and keep the information for a particular period.
B. Your best option would be to disable the user accounts and delete all the information.
C. Your best option would be to disable the user accounts of the staff member and keep the information for a particular period of time. (correct)
D. Your best option would be to contact the superior of the staff member regarding the disposition of user accounts.
You are in the process of implementing a workstation containing the personal identification data on the TestKing.com network. Management requests that the system to be operational prior a security review being completed. What should you inform management regarding the significance of a security review?
A. The security review should be completed to ensure corporate security policy. (correct)
B. The security review should be completed to ensure vulnerability assessment.
C. The security review should be completed to ensure risk assessment.
D. The security review should be completed to ensure the need to know policy.
Related Certifications Included
Related Intel Server Specialist Exams Included
All Major Credit CardsWe accept Visa, Mastercard, Electron and American Express. You can also pay us via PayPal.
SSL Secure Transactions