ExamGecko
Home / ISC / CISSP-ISSAP / List of questions
Ask Question

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 17

List of questions

Question 161

Report Export Collapse

Which of the following protocols provides the highest level of VPN security with a VPN connection that uses the L2TP protocol?

Become a Premium Member for full access
  Unlock Premium Member

Question 162

Report Export Collapse

Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.

Become a Premium Member for full access
  Unlock Premium Member

Question 163

Report Export Collapse

Which of the following uses public key cryptography to encrypt the contents of files?

Become a Premium Member for full access
  Unlock Premium Member

Question 164

Report Export Collapse

An access control secures the confidentiality, integrity, and availability of the information and data of an organization. In which of the following categories can you deploy the access control? Each correct answer represents a part of the solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 165

Report Export Collapse

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites. Which of the following would protect against this?

Become a Premium Member for full access
  Unlock Premium Member

Question 166

Report Export Collapse

You are responsible for security at a defense contracting firm. You are evaluating various possible encryption algorithms to use. One of the algorithms you are examining is not integer based, uses shorter keys, and is public key based. What type of algorithm is this?

Become a Premium Member for full access
  Unlock Premium Member

Question 167

Report Export Collapse

Single Loss Expectancy (SLE) represents an organization's loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?

Become a Premium Member for full access
  Unlock Premium Member

Question 168

Report Export Collapse

Which of the following are man-made threats that an organization faces? Each correct answer represents a complete solution. Choose three.

Become a Premium Member for full access
  Unlock Premium Member

Question 169

Report Export Collapse

Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

Become a Premium Member for full access
  Unlock Premium Member

Question 170

Report Export Collapse

Which of the following describes the acceptable amount of data loss measured in time?

Become a Premium Member for full access
  Unlock Premium Member
Total 237 questions
Go to page: of 24
Search

Related questions