ExamGecko
Home / ISC / CISSP-ISSAP
Ask Question

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 22

Question list
Search

List of questions

Search

Related questions











Question 211

Report
Export
Collapse

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 212

Report
Export
Collapse

Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 213

Report
Export
Collapse

Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?

Become a Premium Member for full access
  Unlock Premium Member

Question 214

Report
Export
Collapse

Which of the following is a form of gate that allows one person to pass at a time?

Become a Premium Member for full access
  Unlock Premium Member

Question 215

Report
Export
Collapse

Which of the following algorithms can be used to check the integrity of a file? 158

Each correct answer represents a complete solution. Choose two.

Become a Premium Member for full access
  Unlock Premium Member

Question 216

Report
Export
Collapse

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

Become a Premium Member for full access
  Unlock Premium Member

Question 217

Report
Export
Collapse

The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities that drive a service evolution during design-time and run-time. Which of the following activities integrates SOA software assets and establishes SOA logical environment dependencies?

Become a Premium Member for full access
  Unlock Premium Member

Question 218

Report
Export
Collapse

You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building.

You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?

Become a Premium Member for full access
  Unlock Premium Member

Question 219

Report
Export
Collapse

Which of the following security architectures defines how to integrate widely disparate applications for a world that is Web-based and uses multiple implementation platforms?

Become a Premium Member for full access
  Unlock Premium Member

Question 220

Report
Export
Collapse

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Become a Premium Member for full access
  Unlock Premium Member
Total 237 questions
Go to page: of 24