ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?

A.
Parallel test
A.
Parallel test
Answers
B.
Simulation test
B.
Simulation test
Answers
C.
Full-interruption test
C.
Full-interruption test
Answers
D.
Checklist test
D.
Checklist test
Answers
Suggested answer: D

Which of the following heights of fence deters only casual trespassers?

A.
8 feet
A.
8 feet
Answers
B.
3 to 4 feet
B.
3 to 4 feet
Answers
C.
2 to 2.5 feet
C.
2 to 2.5 feet
Answers
D.
6 to 7 feet
D.
6 to 7 feet
Answers
Suggested answer: B

In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

A.
Chosen plaintext attack
A.
Chosen plaintext attack
Answers
B.
Ciphertext only attack
B.
Ciphertext only attack
Answers
C.
Chosen ciphertext attack
C.
Chosen ciphertext attack
Answers
D.
Known plaintext attack
D.
Known plaintext attack
Answers
Suggested answer: B

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

A.
Safeguard
A.
Safeguard
Answers
B.
Annualized Rate of Occurrence (ARO)
B.
Annualized Rate of Occurrence (ARO)
Answers
C.
Single Loss Expectancy (SLE)
C.
Single Loss Expectancy (SLE)
Answers
D.
Exposure Factor (EF)
D.
Exposure Factor (EF)
Answers
Suggested answer: B

You work as a Chief Security Officer for Tech Perfect Inc. The company has a TCP/IP based network. You want to use a firewall that can track the state of active connections of the network and then determine which network packets are allowed to enter through the firewall. Which of the following firewalls has this feature?

A.
Stateful packet inspection firewall
A.
Stateful packet inspection firewall
Answers
B.
Proxy-based firewall
B.
Proxy-based firewall
Answers
C.
Dynamic packet-filtering firewall
C.
Dynamic packet-filtering firewall
Answers
D.
Application gateway firewall
D.
Application gateway firewall
Answers
Suggested answer: C

SIMILATION

Fill in the blank with the appropriate security device. ___________ is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view.

A.
Motion detector
A.
Motion detector
Answers
Suggested answer: A

Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?

A.
CHAP
A.
CHAP
Answers
B.
PAP
B.
PAP
Answers
C.
Kerberos
C.
Kerberos
Answers
D.
TACACS
D.
TACACS
Answers
Suggested answer: C

Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?

A.
SMTP service
A.
SMTP service
Answers
B.
Terminal service
B.
Terminal service
Answers
C.
Directory service
C.
Directory service
Answers
D.
DFS service
D.
DFS service
Answers
Suggested answer: C

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

A.
Take a full backup daily and use six-tape rotation.
A.
Take a full backup daily and use six-tape rotation.
Answers
B.
Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.
B.
Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.
Answers
C.
Take a full backup daily with the previous night's tape taken offsite.
C.
Take a full backup daily with the previous night's tape taken offsite.
Answers
D.
Take a full backup on alternate days and keep rotating the tapes.
D.
Take a full backup on alternate days and keep rotating the tapes.
Answers
E.
Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.
E.
Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.
Answers
F.
Take a full backup daily with one tape taken offsite weekly.
F.
Take a full backup daily with one tape taken offsite weekly.
Answers
Suggested answer: C

Which of the following are types of asymmetric encryption algorithms? Each correct answer represents a complete solution. Choose two.

A.
RSA
A.
RSA
Answers
B.
AES
B.
AES
Answers
C.
ECC
C.
ECC
Answers
D.
DES
D.
DES
Answers
Suggested answer: A, C
Total 237 questions
Go to page: of 24