ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











In which of the following access control models, owner of an object decides who is allowed to access the object and what privileges they have?

A.
Access Control List (ACL)
A.
Access Control List (ACL)
Answers
B.
Mandatory Access Control (MAC)
B.
Mandatory Access Control (MAC)
Answers
C.
Role Based Access Control (RBAC)
C.
Role Based Access Control (RBAC)
Answers
D.
Discretionary Access Control (DAC)
D.
Discretionary Access Control (DAC)
Answers
Suggested answer: D

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

A.
Kerberos
A.
Kerberos
Answers
B.
Cryptography
B.
Cryptography
Answers
C.
Cryptographer
C.
Cryptographer
Answers
D.
Cryptanalysis
D.
Cryptanalysis
Answers
Suggested answer: D

Which of the following encryption algorithms is used by the Clipper chip, which supports the escrowed encryption standard?

A.
Skipjack
A.
Skipjack
Answers
B.
Blowfish
B.
Blowfish
Answers
C.
AES
C.
AES
Answers
D.
IDEA
D.
IDEA
Answers
Suggested answer: A

Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose three.

A.
It hides the internal IP addressing scheme.
A.
It hides the internal IP addressing scheme.
Answers
B.
It protects network from the password guessing attacks.
B.
It protects network from the password guessing attacks.
Answers
C.
It is used to connect private networks to the public Internet.
C.
It is used to connect private networks to the public Internet.
Answers
D.
It shares public Internet addresses with a large number of internal network clients.
D.
It shares public Internet addresses with a large number of internal network clients.
Answers
Suggested answer: A, C, D

An organization has implemented a hierarchical-based concept of privilege management in which administrators have full access, HR managers have less permission than the administrators, and data entry operators have no access to resources. Which of the following access control models is implemented in the organization?

A.
Role-based access control (RBAC)
A.
Role-based access control (RBAC)
Answers
B.
Network-based access control (NBAC)
B.
Network-based access control (NBAC)
Answers
C.
Mandatory Access Control (MAC)
C.
Mandatory Access Control (MAC)
Answers
D.
Discretionary access control (DAC)
D.
Discretionary access control (DAC)
Answers
Suggested answer: A

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?

A.
Eradication phase
A.
Eradication phase
Answers
B.
Recovery phase
B.
Recovery phase
Answers
C.
Containment phase
C.
Containment phase
Answers
D.
Preparation phase
D.
Preparation phase
Answers
E.
Identification phase
E.
Identification phase
Answers
Suggested answer: D

Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?

A.
Access control entry (ACE)
A.
Access control entry (ACE)
Answers
B.
Discretionary access control entry (DACE)
B.
Discretionary access control entry (DACE)
Answers
C.
Access control list (ACL)
C.
Access control list (ACL)
Answers
D.
Security Identifier (SID)
D.
Security Identifier (SID)
Answers
Suggested answer: A

Access control systems enable an authority to control access to areas and resources in a given physical facility or computer-based information system. Which of the following services provided by access control systems is used to determine what a subject can do?

A.
Authentication
A.
Authentication
Answers
B.
Authorization
B.
Authorization
Answers
C.
Accountability
C.
Accountability
Answers
D.
Identification
D.
Identification
Answers
Suggested answer: B

You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?

A.
MD
A.
MD
Answers
B.
NTLM
B.
NTLM
Answers
C.
MAC
C.
MAC
Answers
D.
SHA
D.
SHA
Answers
Suggested answer: C

You work as a Network Administrator for company Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?

A.
Stateful firewall
A.
Stateful firewall
Answers
B.
Endian firewall
B.
Endian firewall
Answers
C.
Packet filter firewall
C.
Packet filter firewall
Answers
D.
Proxy-based firewall
D.
Proxy-based firewall
Answers
Suggested answer: D
Total 237 questions
Go to page: of 24