ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

A.
Blowfish
A.
Blowfish
Answers
B.
Twofish
B.
Twofish
Answers
C.
RSA
C.
RSA
Answers
D.
Diffie-Hellman
D.
Diffie-Hellman
Answers
Suggested answer: D

Which of the following electrical events shows a sudden drop of power source that can cause a wide variety of problems on a PC or a network?

A.
Blackout
A.
Blackout
Answers
B.
Power spike
B.
Power spike
Answers
C.
Power sag
C.
Power sag
Answers
D.
Power surge
D.
Power surge
Answers
Suggested answer: A

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

A.
RCO
A.
RCO
Answers
B.
RTO
B.
RTO
Answers
C.
RPO
C.
RPO
Answers
D.
RTA
D.
RTA
Answers
Suggested answer: B

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

A.
Containment
A.
Containment
Answers
B.
Preparation
B.
Preparation
Answers
C.
Recovery
C.
Recovery
Answers
D.
Identification
D.
Identification
Answers
Suggested answer: A

You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.

A.
Parking lot
A.
Parking lot
Answers
B.
All hallways
B.
All hallways
Answers
C.
Server Rooms
C.
Server Rooms
Answers
D.
All offices
D.
All offices
Answers
E.
All entrance doors
E.
All entrance doors
Answers
Suggested answer: C, E

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

A.
Microsoft Internet Information Server (IIS)
A.
Microsoft Internet Information Server (IIS)
Answers
B.
VPN
B.
VPN
Answers
C.
FTP server
C.
FTP server
Answers
D.
Certificate server
D.
Certificate server
Answers
Suggested answer: D

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

A.
CHAP
A.
CHAP
Answers
B.
PEAP
B.
PEAP
Answers
C.
EAP
C.
EAP
Answers
D.
EAP-TLS
D.
EAP-TLS
Answers
Suggested answer: A

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A.
Risk analysis
A.
Risk analysis
Answers
B.
OODA loop
B.
OODA loop
Answers
C.
Cryptography
C.
Cryptography
Answers
D.
Firewall security
D.
Firewall security
Answers
Suggested answer: C

Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.

A.
It uses symmetric key pairs.
A.
It uses symmetric key pairs.
Answers
B.
It provides security using data encryption and digital signature.
B.
It provides security using data encryption and digital signature.
Answers
C.
It uses asymmetric key pairs.
C.
It uses asymmetric key pairs.
Answers
D.
It is a digital representation of information that identifies users.
D.
It is a digital representation of information that identifies users.
Answers
Suggested answer: B, C

Which of the following types of halon is found in portable extinguishers and is stored as a liquid?

A.
Halon-f
A.
Halon-f
Answers
B.
Halon 1301
B.
Halon 1301
Answers
C.
Halon 11
C.
Halon 11
Answers
D.
Halon 1211
D.
Halon 1211
Answers
Suggested answer: D
Total 237 questions
Go to page: of 24