ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

A.
In person attack
A.
In person attack
Answers
B.
Third-party authorization attack
B.
Third-party authorization attack
Answers
C.
Impersonation attack
C.
Impersonation attack
Answers
D.
Important user posing attack
D.
Important user posing attack
Answers
Suggested answer: C

You work as a Chief Security Officer for Tech Perfect Inc. The company has an internal room without any window and is totally in darkness. For security reasons, you want to place a device in the room. Which of the following devices is best for that room?

A.
Photoelectric motion detector
A.
Photoelectric motion detector
Answers
B.
Badge
B.
Badge
Answers
C.
Closed-circuit television
C.
Closed-circuit television
Answers
D.
Alarm
D.
Alarm
Answers
Suggested answer: A

John works as an Ethical Hacker for company Inc. He wants to find out the ports that are open in company's server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?

A.
TCP FIN
A.
TCP FIN
Answers
B.
Xmas tree
B.
Xmas tree
Answers
C.
TCP SYN/ACK
C.
TCP SYN/ACK
Answers
D.
TCP SYN
D.
TCP SYN
Answers
Suggested answer: D

Which of the following layers of the OSI model provides non-repudiation services?

A.
The application layer
A.
The application layer
Answers
B.
The data-link layer
B.
The data-link layer
Answers
C.
The presentation layer
C.
The presentation layer
Answers
D.
The physical layer
D.
The physical layer
Answers
Suggested answer: A

You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?

A.
Repeater
A.
Repeater
Answers
B.
Bridge
B.
Bridge
Answers
C.
Switch
C.
Switch
Answers
D.
Router
D.
Router
Answers
Suggested answer: C

Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?

A.
Detective access control
A.
Detective access control
Answers
B.
Physical access control
B.
Physical access control
Answers
C.
Technical access control
C.
Technical access control
Answers
D.
Administrative access control
D.
Administrative access control
Answers
Suggested answer: B

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

A.
PMK
A.
PMK
Answers
B.
PTK
B.
PTK
Answers
C.
PKI
C.
PKI
Answers
D.
GTK
D.
GTK
Answers
Suggested answer: C

Which of the following algorithms is found to be suitable for both digital signature and encryption?

A.
SHA-1
A.
SHA-1
Answers
B.
MD5
B.
MD5
Answers
C.
AES
C.
AES
Answers
D.
RSA
D.
RSA
Answers
Suggested answer: D

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

A.
Domain Controller
A.
Domain Controller
Answers
B.
Certificate User
B.
Certificate User
Answers
C.
Certification Authority
C.
Certification Authority
Answers
D.
Internet Authentication Server
D.
Internet Authentication Server
Answers
Suggested answer: C

Which of the following authentication methods is based on physical appearance of a user?

A.
Key fob
A.
Key fob
Answers
B.
Biometrics
B.
Biometrics
Answers
C.
ID/password combination
C.
ID/password combination
Answers
D.
Smart card
D.
Smart card
Answers
Suggested answer: B
Total 237 questions
Go to page: of 24