ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











The OSI reference model is divided into layers and each layer has a specific task to perform. At which layer of OSI model is the File and Print service performed?

A.
Session layer
A.
Session layer
Answers
B.
Presentation layer
B.
Presentation layer
Answers
C.
Transport layer
C.
Transport layer
Answers
D.
Application layer
D.
Application layer
Answers
Suggested answer: D

Which of the following cables provides maximum security against electronic eavesdropping on a network?

A.
Fibre optic cable
A.
Fibre optic cable
Answers
B.
STP cable
B.
STP cable
Answers
C.
UTP cable
C.
UTP cable
Answers
D.
NTP cable
D.
NTP cable
Answers
Suggested answer: A

Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

A.
Single Sign-On
A.
Single Sign-On
Answers
B.
One-time password
B.
One-time password
Answers
C.
Dynamic
C.
Dynamic
Answers
D.
Kerberos
D.
Kerberos
Answers
Suggested answer: A

Which of the following authentication methods provides credentials that are only valid during a single session?

A.
Kerberos v5
A.
Kerberos v5
Answers
B.
Smart card
B.
Smart card
Answers
C.
Certificate
C.
Certificate
Answers
D.
Token
D.
Token
Answers
Suggested answer: D

Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection.

Which of the following authentication protocols should be used to accomplish this?

A.
Challenge Handshake Authentication Protocol (CHAP)
A.
Challenge Handshake Authentication Protocol (CHAP)
Answers
B.
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
B.
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
Answers
C.
Open Shortest Path First (OSPF)
C.
Open Shortest Path First (OSPF)
Answers
D.
Extensible Authentication Protocol (EAP)
D.
Extensible Authentication Protocol (EAP)
Answers
Suggested answer: D

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you want to discuss it with your team members for getting appropriate responses of the disaster. In which of the following disaster recovery tests can this task be performed?

A.
Full-interruption test
A.
Full-interruption test
Answers
B.
Parallel test
B.
Parallel test
Answers
C.
Simulation test
C.
Simulation test
Answers
D.
Structured walk-through test
D.
Structured walk-through test
Answers
Suggested answer: C

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?

A.
Port forwarding
A.
Port forwarding
Answers
B.
NAT
B.
NAT
Answers
C.
MAC filtering
C.
MAC filtering
Answers
D.
Firewall
D.
Firewall
Answers
Suggested answer: B

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering? Each correct answer represents a complete solution. Choose two.

A.
Reduce power consumption
A.
Reduce power consumption
Answers
B.
Ease of maintenance
B.
Ease of maintenance
Answers
C.
Failover
C.
Failover
Answers
D.
Load balancing
D.
Load balancing
Answers
Suggested answer: A, B

Which of the following is the most secure method of authentication?

A.
Smart card
A.
Smart card
Answers
B.
Anonymous
B.
Anonymous
Answers
C.
Username and password
C.
Username and password
Answers
D.
Biometrics
D.
Biometrics
Answers
Suggested answer: D

Which of the following are the phases of the Certification and Accreditation (C&A) process? Each correct answer represents a complete solution. Choose two.

A.
Detection
A.
Detection
Answers
B.
Continuous Monitoring
B.
Continuous Monitoring
Answers
C.
Initiation
C.
Initiation
Answers
D.
Auditing
D.
Auditing
Answers
Suggested answer: B, C
Total 237 questions
Go to page: of 24