ExamGecko
Home / ISC / CISSP-ISSAP / List of questions
Ask Question

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

Blowfish
Blowfish
Twofish
Twofish
RSA
RSA
Diffie-Hellman
Diffie-Hellman
Suggested answer: D
asked 18/09/2024
Linda Müller
44 questions

Question 32

Report Export Collapse

Which of the following electrical events shows a sudden drop of power source that can cause a wide variety of problems on a PC or a network?

Blackout
Blackout
Power spike
Power spike
Power sag
Power sag
Power surge
Power surge
Suggested answer: A
asked 18/09/2024
Christopher Fiotes
40 questions

Question 33

Report Export Collapse

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

RCO
RCO
RTO
RTO
RPO
RPO
RTA
RTA
Suggested answer: B
asked 18/09/2024
Lars Bleckmann
49 questions

Question 34

Report Export Collapse

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

Containment
Containment
Preparation
Preparation
Recovery
Recovery
Identification
Identification
Suggested answer: A
asked 18/09/2024
test fdf
54 questions

Question 35

Report Export Collapse

You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.

Parking lot
Parking lot
All hallways
All hallways
Server Rooms
Server Rooms
All offices
All offices
All entrance doors
All entrance doors
Suggested answer: C, E
asked 18/09/2024
John Bocachica
50 questions

Question 36

Report Export Collapse

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Microsoft Internet Information Server (IIS)
Microsoft Internet Information Server (IIS)
VPN
VPN
FTP server
FTP server
Certificate server
Certificate server
Suggested answer: D
asked 18/09/2024
Alvaro Alejandro Zorrilla Tello
37 questions

Question 37

Report Export Collapse

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

CHAP
CHAP
PEAP
PEAP
EAP
EAP
EAP-TLS
EAP-TLS
Suggested answer: A
asked 18/09/2024
Bruce Tablada
40 questions

Question 38

Report Export Collapse

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

Risk analysis
Risk analysis
OODA loop
OODA loop
Cryptography
Cryptography
Firewall security
Firewall security
Suggested answer: C
asked 18/09/2024
SERGIO FREITAS
42 questions

Question 39

Report Export Collapse

Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.

It uses symmetric key pairs.
It uses symmetric key pairs.
It provides security using data encryption and digital signature.
It provides security using data encryption and digital signature.
It uses asymmetric key pairs.
It uses asymmetric key pairs.
It is a digital representation of information that identifies users.
It is a digital representation of information that identifies users.
Suggested answer: B, C
asked 18/09/2024
Baljit Bhadare
44 questions

Question 40

Report Export Collapse

Which of the following types of halon is found in portable extinguishers and is stored as a liquid?

Halon-f
Halon-f
Halon 1301
Halon 1301
Halon 11
Halon 11
Halon 1211
Halon 1211
Suggested answer: D
asked 18/09/2024
Euwing Mendoza
50 questions
Total 237 questions
Go to page: of 24
Search

Related questions