ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most costeffective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?

A.
Evacuation drill
A.
Evacuation drill
Answers
B.
Walk-through drill
B.
Walk-through drill
Answers
C.
Structured walk-through test
C.
Structured walk-through test
Answers
D.
Full-scale exercise
D.
Full-scale exercise
Answers
Suggested answer: C

Which of the following security protocols provides confidentiality, integrity, and authentication of network traffic with end-to-end and intermediate-hop security?

A.
IPSec
A.
IPSec
Answers
B.
SET
B.
SET
Answers
C.
SWIPE
C.
SWIPE
Answers
D.
SKIP
D.
SKIP
Answers
Suggested answer: C

You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF * ARO What information does the AV (Asset Value) convey?

A.
It represents how many times per year a specific threat occurs.
A.
It represents how many times per year a specific threat occurs.
Answers
B.
It represents the percentage of loss that an asset experiences if an anticipated threat occurs.
B.
It represents the percentage of loss that an asset experiences if an anticipated threat occurs.
Answers
C.
It is expected loss for an asset due to a risk over a one year period.
C.
It is expected loss for an asset due to a risk over a one year period.
Answers
D.
It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.
D.
It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.
Answers
Suggested answer: D

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.company.com. What is the most likely cause?

A.
The site's Web server is offline.
A.
The site's Web server is offline.
Answers
B.
The site's Web server has heavy traffic.
B.
The site's Web server has heavy traffic.
Answers
C.
WINS server has no NetBIOS name entry for the server.
C.
WINS server has no NetBIOS name entry for the server.
Answers
D.
DNS entry is not available for the host name.
D.
DNS entry is not available for the host name.
Answers
Suggested answer: D

In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?

A.
Gap analysis
A.
Gap analysis
Answers
B.
Requirement analysis
B.
Requirement analysis
Answers
C.
Cost-benefit analysis
C.
Cost-benefit analysis
Answers
D.
Vulnerability analysis
D.
Vulnerability analysis
Answers
Suggested answer: A

Which of the following processes identifies the threats that can impact the business continuity of operations?

A.
Function analysis
A.
Function analysis
Answers
B.
Risk analysis
B.
Risk analysis
Answers
C.
Business impact analysis
C.
Business impact analysis
Answers
D.
Requirement analysis
D.
Requirement analysis
Answers
Suggested answer: C

What are the benefits of using AAA security service in a network? Each correct answer represents a part of the solution. Choose all that apply.

A.
It provides scalability.
A.
It provides scalability.
Answers
B.
It supports a single backup system.
B.
It supports a single backup system.
Answers
C.
It increases flexibility and control of access configuration.
C.
It increases flexibility and control of access configuration.
Answers
D.
It supports RADIUS, TACACS+, and Kerberos authentication methods.
D.
It supports RADIUS, TACACS+, and Kerberos authentication methods.
Answers
Suggested answer: A, C, D

In which of the following SDLC phases are the software and other components of the system faithfully incorporated into the design specifications?

A.
Programming and training
A.
Programming and training
Answers
B.
Evaluation and acceptance
B.
Evaluation and acceptance
Answers
C.
Definition
C.
Definition
Answers
D.
Initiation
D.
Initiation
Answers
Suggested answer: A

Which of the following life cycle modeling activities establishes service relationships and message exchange paths?

A.
Service-oriented logical design modeling
A.
Service-oriented logical design modeling
Answers
B.
Service-oriented conceptual architecture modeling
B.
Service-oriented conceptual architecture modeling
Answers
C.
Service-oriented discovery and analysis modeling
C.
Service-oriented discovery and analysis modeling
Answers
D.
Service-oriented business integration modeling
D.
Service-oriented business integration modeling
Answers
Suggested answer: A

Which of the following authentication methods support mutual authentication? Each correct answer represents a complete solution. Choose two.

A.
MS-CHAP v2
A.
MS-CHAP v2
Answers
B.
NTLM
B.
NTLM
Answers
C.
EAP-MD5
C.
EAP-MD5
Answers
D.
EAP-TLS
D.
EAP-TLS
Answers
Suggested answer: A, D
Total 237 questions
Go to page: of 24