Flydumps ISC CISSP-ISSAP exam questions and answers in PDF are prepared by our expert, Moreover, they are based on the recommended syllabus covering all the ISC https://www.leads4pass.com/issap.html exam objectives. You will find them to be very helpful and precise in the subject matter since all the ISC CISSP-ISSAP exam content is regularly updated and has been checked for accuracy by our team of Microsoft expert professionals.
QUESTION 21
Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?
A. IDEA
B. PGP
C. DES
D. AES
Correct Answer: C QUESTION 22
Which of the following protocols usespublic-key cryptography to authenticate the remote computer?