ExamGecko
Home / ISC / CISSP-ISSAP / List of questions
Ask Question

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 13

Add to Whishlist

List of questions

Question 121

Report Export Collapse

In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?

Become a Premium Member for full access
  Unlock Premium Member

Question 122

Report Export Collapse

Which of the following heights of fence deters only casual trespassers?

Become a Premium Member for full access
  Unlock Premium Member

Question 123

Report Export Collapse

In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

Become a Premium Member for full access
  Unlock Premium Member

Question 124

Report Export Collapse

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Become a Premium Member for full access
  Unlock Premium Member

Question 125

Report Export Collapse

You work as a Chief Security Officer for Tech Perfect Inc. The company has a TCP/IP based network. You want to use a firewall that can track the state of active connections of the network and then determine which network packets are allowed to enter through the firewall. Which of the following firewalls has this feature?

Become a Premium Member for full access
  Unlock Premium Member

Question 126

Report Export Collapse

SIMILATION

Fill in the blank with the appropriate security device. ___________ is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view.

Become a Premium Member for full access
  Unlock Premium Member

Question 127

Report Export Collapse

Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?

Become a Premium Member for full access
  Unlock Premium Member

Question 128

Report Export Collapse

Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?

Become a Premium Member for full access
  Unlock Premium Member

Question 129

Report Export Collapse

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

Become a Premium Member for full access
  Unlock Premium Member

Question 130

Report Export Collapse

Which of the following are types of asymmetric encryption algorithms? Each correct answer represents a complete solution. Choose two.

Become a Premium Member for full access
  Unlock Premium Member
Total 237 questions
Go to page: of 24
Search

Related questions