ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

A.
Block cipher
A.
Block cipher
Answers
B.
Stream cipher
B.
Stream cipher
Answers
C.
Transposition cipher
C.
Transposition cipher
Answers
D.
Message Authentication Code
D.
Message Authentication Code
Answers
Suggested answer: A, B, D

Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.

A.
Dictionary attack
A.
Dictionary attack
Answers
B.
Mail bombing
B.
Mail bombing
Answers
C.
Spoofing
C.
Spoofing
Answers
D.
Brute force attack
D.
Brute force attack
Answers
Suggested answer: B, C, D

Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?

A.
PEAP
A.
PEAP
Answers
B.
EAP-TLS
B.
EAP-TLS
Answers
C.
WEP
C.
WEP
Answers
D.
EAP-FAST
D.
EAP-FAST
Answers
Suggested answer: B

Which of the following is a form of gate that allows one person to pass at a time?

A.
Biometric
A.
Biometric
Answers
B.
Man-trap
B.
Man-trap
Answers
C.
Turnstile
C.
Turnstile
Answers
D.
Fence
D.
Fence
Answers
Suggested answer: C

Which of the following algorithms can be used to check the integrity of a file? 158

Each correct answer represents a complete solution. Choose two.

A.
md5
A.
md5
Answers
B.
rsa
B.
rsa
Answers
C.
blowfish
C.
blowfish
Answers
D.
sha
D.
sha
Answers
Suggested answer: A, D

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

A.
Connect a brouter to the network.
A.
Connect a brouter to the network.
Answers
B.
Implement a proxy server on the network.
B.
Implement a proxy server on the network.
Answers
C.
Connect a router to the network.
C.
Connect a router to the network.
Answers
D.
Implement firewall on the network.
D.
Implement firewall on the network.
Answers
Suggested answer: D

The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities that drive a service evolution during design-time and run-time. Which of the following activities integrates SOA software assets and establishes SOA logical environment dependencies?

A.
Service-oriented business integration modeling
A.
Service-oriented business integration modeling
Answers
B.
Service-oriented logical design modeling
B.
Service-oriented logical design modeling
Answers
C.
Service-oriented discovery and analysis modeling
C.
Service-oriented discovery and analysis modeling
Answers
D.
Service-oriented logical architecture modeling
D.
Service-oriented logical architecture modeling
Answers
Suggested answer: D

You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building.

You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?

A.
Implement a sign in sheet at the main entrance and route all traffic through there.
A.
Implement a sign in sheet at the main entrance and route all traffic through there.
Answers
B.
Have all people entering the building use smart cards for access.
B.
Have all people entering the building use smart cards for access.
Answers
C.
Implement biometric access.
C.
Implement biometric access.
Answers
D.
Implement cameras at all entrances.
D.
Implement cameras at all entrances.
Answers
Suggested answer: A

Which of the following security architectures defines how to integrate widely disparate applications for a world that is Web-based and uses multiple implementation platforms?

A.
Sherwood Applied Business Security Architecture
A.
Sherwood Applied Business Security Architecture
Answers
B.
Service-oriented modeling and architecture
B.
Service-oriented modeling and architecture
Answers
C.
Enterprise architecture
C.
Enterprise architecture
Answers
D.
Service-oriented architecture
D.
Service-oriented architecture
Answers
Suggested answer: D

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

A.
Asymmetric
A.
Asymmetric
Answers
B.
Symmetric
B.
Symmetric
Answers
C.
S/MIME
C.
S/MIME
Answers
D.
PGP
D.
PGP
Answers
Suggested answer: B
Total 237 questions
Go to page: of 24