ExamGecko
Home / ISC / CISSP-ISSAP / List of questions
Ask Question

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 3

List of questions

Question 21

Report Export Collapse

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?

IDEA
IDEA
PGP
PGP
DES
DES
AES
AES
Suggested answer: C
asked 18/09/2024
Jose Osnayo
47 questions

Question 22

Report Export Collapse

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

SSH
SSH
Telnet
Telnet
SCP
SCP
SSL
SSL
Suggested answer: A
asked 18/09/2024
waleed Haridi
39 questions

Question 23

Report Export Collapse

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Authentication
Authentication
Non-repudiation
Non-repudiation
Integrity
Integrity
Confidentiality
Confidentiality
Suggested answer: D
asked 18/09/2024
Nuno Silva
41 questions

Question 24

Report Export Collapse

Which of the following are the examples of technical controls? Each correct answer represents a complete solution. Choose three.

Auditing
Auditing
Network acchitecture
Network acchitecture
System access
System access
Data backups
Data backups
Suggested answer: A, B, C
asked 18/09/2024
Andrea Trivisonno
35 questions

Question 25

Report Export Collapse

Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution.

Choose all that apply.

Integrity
Integrity
Accountability
Accountability
Availability
Availability
Confidentiality
Confidentiality
Suggested answer: A, C, D
asked 18/09/2024
Moraes, Jefferson
50 questions

Question 26

Report Export Collapse

Which of the following types of attacks cannot be prevented by technical measures only?

Social engineering
Social engineering
Brute force
Brute force
Smurf DoS Ping
Smurf DoS Ping
flood attack
flood attack
Suggested answer: A
asked 18/09/2024
vinoth inigo
46 questions

Question 27

Report Export Collapse

Which of the following attacks can be overcome by applying cryptography?

Web ripping
Web ripping
DoS
DoS
Sniffing
Sniffing
Buffer overflow
Buffer overflow
Suggested answer: C
asked 18/09/2024
Storage Junk
52 questions

Question 28

Report Export Collapse

Which of the following authentication methods prevents unauthorized execution of code on remote systems?

TACACS
TACACS
S-RPC
S-RPC
RADIUS
RADIUS
CHAP
CHAP
Suggested answer: B
asked 18/09/2024
Arkadiusz Skopinski
48 questions

Question 29

Report Export Collapse

The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information? Each correct answer represents a complete solution. Choose all that apply.

Transport layer
Transport layer
Physical layer
Physical layer
Data Link layer
Data Link layer
Network layer
Network layer
Suggested answer: A, D
asked 18/09/2024
Sneh Fields
45 questions

Question 30

Report Export Collapse

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.

Synchronous
Synchronous
Secret
Secret
Asymmetric
Asymmetric
Symmetric
Symmetric
Suggested answer: C, D
asked 18/09/2024
Hydir Sherbini
32 questions
Total 237 questions
Go to page: of 24
Search

Related questions