ExamGecko
Home / ISC / CISSP-ISSAP / List of questions
Ask Question

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

Which of the following firewalls inspects the actual contents of packets?

Become a Premium Member for full access
  Unlock Premium Member

Question 92

Report Export Collapse

Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.

Become a Premium Member for full access
  Unlock Premium Member

Question 93

Report Export Collapse

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?

Become a Premium Member for full access
  Unlock Premium Member

Question 94

Report Export Collapse

John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?

Become a Premium Member for full access
  Unlock Premium Member

Question 95

Report Export Collapse

Which of the following encryption algorithms are based on block ciphers?

Become a Premium Member for full access
  Unlock Premium Member

Question 96

Report Export Collapse

Adam works as a Network Administrator. He discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext.

It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. Which of the following types of authentication mechanism is used here?

Become a Premium Member for full access
  Unlock Premium Member

Question 97

Report Export Collapse

The OSI model is the most common networking model used in the industry. Applications, network functions, and protocols are typically referenced using one or more of the seven OSI layers. Of the following, choose the two best statements that describe the OSI layer functions. Each correct answer represents a complete solution. Choose two.

Become a Premium Member for full access
  Unlock Premium Member

Question 98

Report Export Collapse

Which of the following is the technology of indoor or automotive environmental comfort?

Become a Premium Member for full access
  Unlock Premium Member

Question 99

Report Export Collapse

Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?

Become a Premium Member for full access
  Unlock Premium Member

Question 100

Report Export Collapse

Which of the following types of ciphers are included in the historical ciphers? Each correct answer represents a complete solution. Choose two.

Become a Premium Member for full access
  Unlock Premium Member
Total 237 questions
Go to page: of 24
Search

Related questions