ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

A.
Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer
A.
Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer
Answers
B.
Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer
B.
Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer
Answers
C.
application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
C.
application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
Answers
D.
Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer
D.
Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer
Answers
Suggested answer: D

Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.

A.
Water
A.
Water
Answers
B.
CO2
B.
CO2
Answers
C.
Halon
C.
Halon
Answers
D.
Soda acid
D.
Soda acid
Answers
Suggested answer: B, C, D

SIMULATION Fill in the blank with the appropriate phrase. The is a simple document that provides a high-level view of the entire organization's disaster recovery efforts.

A.
Executive summary
A.
Executive summary
Answers
Suggested answer: A

You work as a Chief Security Officer for Tech Perfect Inc. You have configured IPSec and ISAKMP protocol in the company's network in order to establish a secure communication infrastructure. ccording to the Internet RFC 2408, which of the following services does the ISAKMP protocol offer to the network? Each correct answer represents a part of the solution. Choose all that apply.

A.
It relies upon a system of security associations.
A.
It relies upon a system of security associations.
Answers
B.
It provides key generation mechanisms.
B.
It provides key generation mechanisms.
Answers
C.
It authenticates communicating peers.
C.
It authenticates communicating peers.
Answers
D.
It protects against threats, such as DoS attack, replay attack, etc.
D.
It protects against threats, such as DoS attack, replay attack, etc.
Answers
Suggested answer: B, C, D

Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?

A.
Service-oriented modeling framework (SOMF)
A.
Service-oriented modeling framework (SOMF)
Answers
B.
Service-oriented modeling and architecture (SOMA)
B.
Service-oriented modeling and architecture (SOMA)
Answers
C.
Sherwood Applied Business Security Architecture (SABSA)
C.
Sherwood Applied Business Security Architecture (SABSA)
Answers
D.
Service-oriented architecture (SOA)
D.
Service-oriented architecture (SOA)
Answers
Suggested answer: A

The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Which of the following components does the PKI use to list those certificates that have been revoked or are no longer valid?

A.
Certification Practice Statement
A.
Certification Practice Statement
Answers
B.
Certificate Policy
B.
Certificate Policy
Answers
C.
Certificate Revocation List
C.
Certificate Revocation List
Answers
D.
Certification Authority
D.
Certification Authority
Answers
Suggested answer: C

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries.

But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

A.
Identification
A.
Identification
Answers
B.
Eradication
B.
Eradication
Answers
C.
Recovery
C.
Recovery
Answers
D.
Contamination
D.
Contamination
Answers
E.
Preparation
E.
Preparation
Answers
Suggested answer: B, C, D

Which of the following ports must be opened on the firewall for the VPN connection using Point-to-Point Tunneling Protocol (PPTP)?

A.
TCP port 110
A.
TCP port 110
Answers
B.
TCP port 443
B.
TCP port 443
Answers
C.
TCP port 5060
C.
TCP port 5060
Answers
D.
TCP port 1723
D.
TCP port 1723
Answers
Suggested answer: D

Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?

A.
Disaster recovery plan
A.
Disaster recovery plan
Answers
B.
Contingency plan
B.
Contingency plan
Answers
C.
Business Continuity plan
C.
Business Continuity plan
Answers
D.
Continuity of Operations plan
D.
Continuity of Operations plan
Answers
Suggested answer: A

Which of the following types of ciphers operates on a group of bits rather than an individual character or bit of a message?

A.
Block cipher
A.
Block cipher
Answers
B.
Classical cipher
B.
Classical cipher
Answers
C.
Substitution cipher
C.
Substitution cipher
Answers
D.
Stream cipher
D.
Stream cipher
Answers
Suggested answer: A
Total 237 questions
Go to page: of 24