ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 24

Question list
Search
Search

Related questions











Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?

A.
Asymmetric
A.
Asymmetric
Answers
B.
Hashing
B.
Hashing
Answers
C.
Numeric
C.
Numeric
Answers
D.
Symmetric
D.
Symmetric
Answers
Suggested answer: A

Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a regular occurrence. Which of the following will you tell her to use to protect her computer?

A.
UPS
A.
UPS
Answers
B.
Multimeter
B.
Multimeter
Answers
C.
SMPS
C.
SMPS
Answers
D.
CMOS battery
D.
CMOS battery
Answers
Suggested answer: A

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

A.
Risk acceptance
A.
Risk acceptance
Answers
B.
Risk avoidance
B.
Risk avoidance
Answers
C.
Risk transfer
C.
Risk transfer
Answers
D.
Risk mitigation
D.
Risk mitigation
Answers
Suggested answer: C

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question?

Each correct answer represents a part of the solution. Choose three.

A.
Guarantee the reliability of standby systems through testing and simulation.
A.
Guarantee the reliability of standby systems through testing and simulation.
Answers
B.
Protect an organization from major computer services failure.
B.
Protect an organization from major computer services failure.
Answers
C.
Minimize the risk to the organization from delays in providing services.
C.
Minimize the risk to the organization from delays in providing services.
Answers
D.
Maximize the decision-making required by personnel during a disaster.
D.
Maximize the decision-making required by personnel during a disaster.
Answers
Suggested answer: A, B, C

You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security reasons. The manager of the company tells you to establish connectivity between clients and servers of the network which prevents eavesdropping and tampering of data on the Internet. Which of the following will you configure on the network to perform the given task?

A.
WEP
A.
WEP
Answers
B.
IPsec
B.
IPsec
Answers
C.
VPN
C.
VPN
Answers
D.
SSL
D.
SSL
Answers
Suggested answer: D

The security controls that are implemented to manage physical security are divided in various groups. Which of the following services are offered by the administrative physical security control group? Each correct answer represents a part of the solution. Choose all that apply.

A.
Construction and selection
A.
Construction and selection
Answers
B.
Site management
B.
Site management
Answers
C.
Awareness training
C.
Awareness training
Answers
D.
Access control
D.
Access control
Answers
E.
Intrusion detection
E.
Intrusion detection
Answers
F.
Personnel control
F.
Personnel control
Answers
Suggested answer: A, B, C

Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the presentation. Which of the following will she use to accomplish the task?

A.
Mark as final
A.
Mark as final
Answers
B.
Digital Signature
B.
Digital Signature
Answers
C.
Restrict Permission
C.
Restrict Permission
Answers
D.
Encrypt Document
D.
Encrypt Document
Answers
Suggested answer: B

Explanation:


Total 237 questions
Go to page: of 24