ISC CISSP-ISSAP Practice Test - Questions Answers, Page 12

List of questions
Question 111

Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?
Question 112

Which of the following schemes is used by the Kerberos authentication?
Question 113

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?
Question 114

Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.
Question 115

You are implementing some security services in an organization, such as smart cards, biometrics, access control lists, firewalls, intrusion detection systems, and clipping levels. Which of the following categories of implementation of the access control includes all these security services?
Question 116

You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the company. Which of the following devices will you use to physically connect the computers in the VLAN? Each correct answer represents a complete solution. Choose two.
Question 117

Which of the following protocols work at the Network layer of the OSI model?
Question 118

Which of the following are used to suppress paper or wood fires? Each correct answer represents a complete solution. Choose two.
Question 119

Mark works as a Network Administrator for NetTech Inc. He wants to connect the company's headquarter and its regional offices using a WAN technology. For this, he uses packet-switched connection. Which of the following WAN technologies will Mark use to connect the offices? Each correct answer represents a complete solution. Choose two.
Question 120

SIMULATION Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.
Question