ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











Question 191

Report
Export
Collapse

In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 192

Report
Export
Collapse

You work as a Chief Security Officer for Tech Perfect Inc. The company has an internal room without any window and is totally in darkness. For security reasons, you want to place a device in the room. Which of the following devices is best for that room?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 193

Report
Export
Collapse

John works as an Ethical Hacker for company Inc. He wants to find out the ports that are open in company's server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 194

Report
Export
Collapse

Which of the following layers of the OSI model provides non-repudiation services?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 195

Report
Export
Collapse

You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 196

Report
Export
Collapse

Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 197

Report
Export
Collapse

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 198

Report
Export
Collapse

Which of the following algorithms is found to be suitable for both digital signature and encryption?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 199

Report
Export
Collapse

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 200

Report
Export
Collapse

Which of the following authentication methods is based on physical appearance of a user?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 237 questions
Go to page: of 24