ISC CISSP-ISSAP Practice Test - Questions Answers, Page 12
List of questions
Related questions
Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?
Which of the following schemes is used by the Kerberos authentication?
You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?
Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.
You are implementing some security services in an organization, such as smart cards, biometrics, access control lists, firewalls, intrusion detection systems, and clipping levels. Which of the following categories of implementation of the access control includes all these security services?
You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the company. Which of the following devices will you use to physically connect the computers in the VLAN? Each correct answer represents a complete solution. Choose two.
Which of the following protocols work at the Network layer of the OSI model?
Which of the following are used to suppress paper or wood fires? Each correct answer represents a complete solution. Choose two.
Mark works as a Network Administrator for NetTech Inc. He wants to connect the company's headquarter and its regional offices using a WAN technology. For this, he uses packet-switched connection. Which of the following WAN technologies will Mark use to connect the offices? Each correct answer represents a complete solution. Choose two.
SIMULATION Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.
Question