ExamGecko
Home / ISC / CISSP-ISSAP / List of questions
Ask Question

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 16

Add to Whishlist

List of questions

Question 151

Report Export Collapse

Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

Become a Premium Member for full access
  Unlock Premium Member

Question 152

Report Export Collapse

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

Become a Premium Member for full access
  Unlock Premium Member

Question 153

Report Export Collapse

Which of the following backup types backs up files that have been added and all data that have been modified since the most recent backup was performed?

Become a Premium Member for full access
  Unlock Premium Member

Question 154

Report Export Collapse

You are responsible for security at a hospital. Since many computers are accessed by multiple employees 24 hours a day, 7 days a week, controlling physical access to computers is very difficult. This is compounded by a high number of non employees moving through the building. You are concerned about unauthorized access to patient records. What would best solve this problem?

Become a Premium Member for full access
  Unlock Premium Member

Question 155

Report Export Collapse

In which of the following cryptographic attacking techniques does the attacker pick up the information to be encrypted and take a copy of it with the encrypted data?

Become a Premium Member for full access
  Unlock Premium Member

Question 156

Report Export Collapse

Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 157

Report Export Collapse

Which of the following encryption modes has the property to allow many error correcting codes to function normally even when applied before encryption?

Become a Premium Member for full access
  Unlock Premium Member

Question 158

Report Export Collapse

In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?

Become a Premium Member for full access
  Unlock Premium Member

Question 159

Report Export Collapse

You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?

Become a Premium Member for full access
  Unlock Premium Member

Question 160

Report Export Collapse

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.

Become a Premium Member for full access
  Unlock Premium Member
Total 237 questions
Go to page: of 24
Search

Related questions