ISC CISSP-ISSAP Practice Test - Questions Answers, Page 16

List of questions
Question 151

Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?
Question 152

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.
Question 153

Which of the following backup types backs up files that have been added and all data that have been modified since the most recent backup was performed?
Question 154

You are responsible for security at a hospital. Since many computers are accessed by multiple employees 24 hours a day, 7 days a week, controlling physical access to computers is very difficult. This is compounded by a high number of non employees moving through the building. You are concerned about unauthorized access to patient records. What would best solve this problem?
Question 155

In which of the following cryptographic attacking techniques does the attacker pick up the information to be encrypted and take a copy of it with the encrypted data?
Question 156

Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.
Question 157

Which of the following encryption modes has the property to allow many error correcting codes to function normally even when applied before encryption?
Question 158

In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?
Question 159

You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?
Question 160

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.
Question