ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

A.
Denial-of-Service attack
A.
Denial-of-Service attack
Answers
B.
Vulnerability attack
B.
Vulnerability attack
Answers
C.
Social Engineering attack
C.
Social Engineering attack
Answers
D.
Impersonation attack
D.
Impersonation attack
Answers
Suggested answer: A

Which of the following types of firewall functions at the Session layer of OSI model?

A.
Circuit-level firewall
A.
Circuit-level firewall
Answers
B.
Application-level firewall
B.
Application-level firewall
Answers
C.
Packet filtering firewall
C.
Packet filtering firewall
Answers
D.
Switch-level firewall
D.
Switch-level firewall
Answers
Suggested answer: A

Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.

A.
It typically executes at a higher speed than a block cipher.
A.
It typically executes at a higher speed than a block cipher.
Answers
B.
It divides a message into blocks for processing.
B.
It divides a message into blocks for processing.
Answers
C.
It typically executes at a slower speed than a block cipher.
C.
It typically executes at a slower speed than a block cipher.
Answers
D.
It divides a message into bits for processing.
D.
It divides a message into bits for processing.
Answers
E.
It is a symmetric key cipher.
E.
It is a symmetric key cipher.
Answers
Suggested answer: A, D, E

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

A.
Social engineering attack
A.
Social engineering attack
Answers
B.
Cross site scripting attack
B.
Cross site scripting attack
Answers
C.
Mail bombing
C.
Mail bombing
Answers
D.
Password guessing attack
D.
Password guessing attack
Answers
Suggested answer: A

You are the Security Consultant advising a company on security methods. This is a highly secure location that deals with sensitive national defense related data.

They are very concerned about physical security as they had a breach last month. In that breach an individual had simply grabbed a laptop and ran out of the building. Which one of the following would have been most effective in preventing this?

A.
Not using laptops.
A.
Not using laptops.
Answers
B.
Keeping all doors locked with a guard.
B.
Keeping all doors locked with a guard.
Answers
C.
Using a man-trap.
C.
Using a man-trap.
Answers
D.
A sign in log.
D.
A sign in log.
Answers
Suggested answer: C

You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?

A.
Bus topology
A.
Bus topology
Answers
B.
Fully meshed topology
B.
Fully meshed topology
Answers
C.
Star topology
C.
Star topology
Answers
D.
Partially meshed topology
D.
Partially meshed topology
Answers
Suggested answer: D

Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?

A.
RSTP
A.
RSTP
Answers
B.
SKIP
B.
SKIP
Answers
C.
OCSP
C.
OCSP
Answers
D.
HTTP
D.
HTTP
Answers
Suggested answer: C

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.

A.
GTC
A.
GTC
Answers
B.
MS-CHAP v2
B.
MS-CHAP v2
Answers
C.
AES
C.
AES
Answers
D.
RC4
D.
RC4
Answers
Suggested answer: A, B

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

A.
Integrity
A.
Integrity
Answers
B.
Confidentiality
B.
Confidentiality
Answers
C.
Authentication
C.
Authentication
Answers
D.
Non-repudiation
D.
Non-repudiation
Answers
Suggested answer: D

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?

A.
Biometric device
A.
Biometric device
Answers
B.
One Time Password
B.
One Time Password
Answers
C.
Proximity cards
C.
Proximity cards
Answers
D.
Security token
D.
Security token
Answers
Suggested answer: D
Total 237 questions
Go to page: of 24