ExamGecko
Home / ISC / CISSP-ISSAP / List of questions
Ask Question

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report Export Collapse

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Denial-of-Service attack
Denial-of-Service attack
Vulnerability attack
Vulnerability attack
Social Engineering attack
Social Engineering attack
Impersonation attack
Impersonation attack
Suggested answer: A
asked 18/09/2024
Tobi Space
47 questions

Question 12

Report Export Collapse

Which of the following types of firewall functions at the Session layer of OSI model?

Circuit-level firewall
Circuit-level firewall
Application-level firewall
Application-level firewall
Packet filtering firewall
Packet filtering firewall
Switch-level firewall
Switch-level firewall
Suggested answer: A
asked 18/09/2024
mustapha amraui
42 questions

Question 13

Report Export Collapse

Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.

It typically executes at a higher speed than a block cipher.
It typically executes at a higher speed than a block cipher.
It divides a message into blocks for processing.
It divides a message into blocks for processing.
It typically executes at a slower speed than a block cipher.
It typically executes at a slower speed than a block cipher.
It divides a message into bits for processing.
It divides a message into bits for processing.
It is a symmetric key cipher.
It is a symmetric key cipher.
Suggested answer: A, D, E
asked 18/09/2024
MARCONDES SANTOS
38 questions

Question 14

Report Export Collapse

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Social engineering attack
Social engineering attack
Cross site scripting attack
Cross site scripting attack
Mail bombing
Mail bombing
Password guessing attack
Password guessing attack
Suggested answer: A
asked 18/09/2024
Firasat Siddiqui
49 questions

Question 15

Report Export Collapse

You are the Security Consultant advising a company on security methods. This is a highly secure location that deals with sensitive national defense related data.

They are very concerned about physical security as they had a breach last month. In that breach an individual had simply grabbed a laptop and ran out of the building. Which one of the following would have been most effective in preventing this?

Not using laptops.
Not using laptops.
Keeping all doors locked with a guard.
Keeping all doors locked with a guard.
Using a man-trap.
Using a man-trap.
A sign in log.
A sign in log.
Suggested answer: C
asked 18/09/2024
Kayode Omotosho
46 questions

Question 16

Report Export Collapse

You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?

Bus topology
Bus topology
Fully meshed topology
Fully meshed topology
Star topology
Star topology
Partially meshed topology
Partially meshed topology
Suggested answer: D
asked 18/09/2024
Joseph Martin
34 questions

Question 17

Report Export Collapse

Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?

RSTP
RSTP
SKIP
SKIP
OCSP
OCSP
HTTP
HTTP
Suggested answer: C
asked 18/09/2024
Allen J Tyson
36 questions

Question 18

Report Export Collapse

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.

GTC
GTC
MS-CHAP v2
MS-CHAP v2
AES
AES
RC4
RC4
Suggested answer: A, B
asked 18/09/2024
Jialu Wang
38 questions

Question 19

Report Export Collapse

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Integrity
Integrity
Confidentiality
Confidentiality
Authentication
Authentication
Non-repudiation
Non-repudiation
Suggested answer: D
asked 18/09/2024
Shoban Babu
46 questions

Question 20

Report Export Collapse

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?

Biometric device
Biometric device
One Time Password
One Time Password
Proximity cards
Proximity cards
Security token
Security token
Suggested answer: D
asked 18/09/2024
Glenn Abdoelkarim
39 questions
Total 237 questions
Go to page: of 24
Search

Related questions