New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 6 Question 36 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 36
Topic #: 6
[All ISSAP Questions]

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites. Which of the following would protect against this?

Show Suggested Answer Hide Answer
Suggested Answer: B

server. For example some banks now have a user pick an image and a phrase that is stored. When they enter their user name, the bank Web

site will display their pre-selected image and phrase, before the user enters their password. If the user does not see their unique

image/phrase combination, then this is not really the bank Web site.


Contribute your Thoughts:

0/2000 characters
Shelia
4 months ago
Definitely agree on two factor being effective against phishing!
upvoted 0 times
...
Samira
4 months ago
Three factor authentication would be overkill, right?
upvoted 0 times
...
Julianna
4 months ago
Wait, can MAC really help with phishing? Not so sure.
upvoted 0 times
...
Mi
4 months ago
Mutual authentication sounds like a solid choice too.
upvoted 0 times
...
Essie
5 months ago
Two factor authentication is a must for security!
upvoted 0 times
...
Huey
5 months ago
I think MAC might not be relevant here since it’s more about access control than protecting against phishing.
upvoted 0 times
...
Shizue
5 months ago
I practiced a similar question where three-factor authentication was mentioned, but I’m not convinced it’s necessary for this scenario.
upvoted 0 times
...
Reuben
5 months ago
I'm not entirely sure, but I feel like two-factor authentication is a common recommendation for preventing phishing.
upvoted 0 times
...
Xochitl
5 months ago
I remember studying phishing attacks, and I think mutual authentication could help verify the bank's identity to customers.
upvoted 0 times
...
Alishia
5 months ago
I think I know the answer to this one. The question is asking about the baseline platform configuration, so I'm guessing it's option A - users with the ITIL role or Change-specific roles.
upvoted 0 times
...
Arlen
5 months ago
I like the idea of decomposing the schedules to better understand the dependencies and resource needs. That could help identify any potential issues or opportunities to deliver value sooner.
upvoted 0 times
...
Nickole
5 months ago
Wasn't it Crosby? I practiced a question where he talked about doing things right the first time.
upvoted 0 times
...
Malcom
5 months ago
Hmm, I'm a bit confused by this one. I know the credit terms have something to do with discounts and payment deadlines, but I'm not sure how that connects to the organization's borrowing costs and cash position. I'll need to think this through carefully.
upvoted 0 times
...

Save Cancel