exam questions

Exam CISSP-ISSAP All Questions

View all questions & answers for the CISSP-ISSAP exam

Exam CISSP-ISSAP topic 1 question 53 discussion

Actual exam question from ISC's CISSP-ISSAP
Question #: 53
Topic #: 1
[All CISSP-ISSAP Questions]

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

  • A. Risk analysis
  • B. Firewall security
  • C. Cryptography
  • D. OODA loop
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
74gjd_37
4 months, 2 weeks ago
Selected Answer: C
the correct answer is C. Cryptography. Cryptography is a technique used for modifying messages to provide information and cyber security while reducing the risk of hacking attacks during communications and message passing over the internet. It involves encoding or encrypting data in such a way that it can only be accessed or understood by authorized parties who possess the decryption key. Let's briefly describe the other options mentioned:
upvoted 1 times
74gjd_37
4 months, 2 weeks ago
A. Risk analysis: Risk analysis is a process that involves identifying, assessing, and prioritizing risks to determine appropriate actions for mitigating those risks. While risk analysis plays an important role in overall security management, it does not directly relate to modifying messages or providing security during communications. B. Firewall security: Firewalls are network security devices designed to monitor incoming and outgoing traffic based on preset rulesets. They serve as a barrier between trusted internal networks (such as company intranets) and untrusted external networks (such as the Internet). While firewalls contribute to overall network security, they do not specifically address message modification or communication security. D. OODA loop: The OODA (Observe-Orient-Decide-Act) loop is a decision-making cycle used in military strategy where rapid adaptation and response are critical factors. While this concept may have applications within information/cybersecurity planning and incident response scenarios, it does not directly relate to modifying messages or providing communication-security techniques.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago