ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











Which of the following firewalls inspects the actual contents of packets?

A.
Packet filtering firewall
A.
Packet filtering firewall
Answers
B.
Stateful inspection firewall
B.
Stateful inspection firewall
Answers
C.
Application-level firewall
C.
Application-level firewall
Answers
D.
Circuit-level firewall
D.
Circuit-level firewall
Answers
Suggested answer: C

Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.

A.
It is the fastest method of backing up data.
A.
It is the fastest method of backing up data.
Answers
B.
It is the slowest method for taking a data backup.
B.
It is the slowest method for taking a data backup.
Answers
C.
It backs up the entire database, including the transaction log.
C.
It backs up the entire database, including the transaction log.
Answers
D.
It backs up only the files changed since the most recent backup and clears the archive bit.
D.
It backs up only the files changed since the most recent backup and clears the archive bit.
Answers
Suggested answer: A, D

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?

A.
L2TP
A.
L2TP
Answers
B.
HTTPS
B.
HTTPS
Answers
C.
SSL
C.
SSL
Answers
D.
IPSec
D.
IPSec
Answers
Suggested answer: A

John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?

A.
Star
A.
Star
Answers
B.
Mesh
B.
Mesh
Answers
C.
Bus
C.
Bus
Answers
D.
Ring
D.
Ring
Answers
Suggested answer: B

Which of the following encryption algorithms are based on block ciphers?

A.
RC4
A.
RC4
Answers
B.
Twofish
B.
Twofish
Answers
C.
Rijndael
C.
Rijndael
Answers
D.
RC5
D.
RC5
Answers
Suggested answer: B, C, D

Adam works as a Network Administrator. He discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext.

It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. Which of the following types of authentication mechanism is used here?

A.
Pre-shared key authentication
A.
Pre-shared key authentication
Answers
B.
Open system authentication
B.
Open system authentication
Answers
C.
Shared key authentication
C.
Shared key authentication
Answers
D.
Single key authentication
D.
Single key authentication
Answers
Suggested answer: C

The OSI model is the most common networking model used in the industry. Applications, network functions, and protocols are typically referenced using one or more of the seven OSI layers. Of the following, choose the two best statements that describe the OSI layer functions. Each correct answer represents a complete solution. Choose two.

A.
Layers 1 and 2 deal with application functionality and data formatting. These layers reside at the top of the model.
A.
Layers 1 and 2 deal with application functionality and data formatting. These layers reside at the top of the model.
Answers
B.
Layers 4 through 7 define the functionality of IP Addressing, Physical Standards, and Data Link protocols.
B.
Layers 4 through 7 define the functionality of IP Addressing, Physical Standards, and Data Link protocols.
Answers
C.
Layers 5, 6, and 7 focus on the Network Application, which includes data formatting and session control.
C.
Layers 5, 6, and 7 focus on the Network Application, which includes data formatting and session control.
Answers
D.
Layers 1, 2, 3, and 4 deal with physical connectivity, encapsulation, IP Addressing, and Error Recovery. These layers define the end-to-end functions of data delivery.
D.
Layers 1, 2, 3, and 4 deal with physical connectivity, encapsulation, IP Addressing, and Error Recovery. These layers define the end-to-end functions of data delivery.
Answers
Suggested answer: C, D

Which of the following is the technology of indoor or automotive environmental comfort?

A.
HIPS
A.
HIPS
Answers
B.
HVAC
B.
HVAC
Answers
C.
NIPS
C.
NIPS
Answers
D.
CCTV
D.
CCTV
Answers
Suggested answer: B

Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?

A.
PPTP
A.
PPTP
Answers
B.
SMTP
B.
SMTP
Answers
C.
HTTPS
C.
HTTPS
Answers
D.
L2TP
D.
L2TP
Answers
Suggested answer: D

Which of the following types of ciphers are included in the historical ciphers? Each correct answer represents a complete solution. Choose two.

A.
Block ciphers
A.
Block ciphers
Answers
B.
Transposition ciphers
B.
Transposition ciphers
Answers
C.
Stream ciphers
C.
Stream ciphers
Answers
D.
Substitution ciphers
D.
Substitution ciphers
Answers
Suggested answer: B, D
Total 237 questions
Go to page: of 24