ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

A.
SPAP
A.
SPAP
Answers
B.
MSCHAP
B.
MSCHAP
Answers
C.
PAP
C.
PAP
Answers
D.
MSCHAP V2
D.
MSCHAP V2
Answers
Suggested answer: C

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

A.
Structured walk-through test
A.
Structured walk-through test
Answers
B.
Simulation test
B.
Simulation test
Answers
C.
Full-interruption test
C.
Full-interruption test
Answers
D.
Parallel test
D.
Parallel test
Answers
Suggested answer: C

In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?

A.
Ring topology
A.
Ring topology
Answers
B.
Tree topology
B.
Tree topology
Answers
C.
Star topology
C.
Star topology
Answers
D.
Mesh topology
D.
Mesh topology
Answers
Suggested answer: A

You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?

A.
AES
A.
AES
Answers
B.
SHA
B.
SHA
Answers
C.
EAP
C.
EAP
Answers
D.
CRC32
D.
CRC32
Answers
Suggested answer: B

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

A.
Man trap
A.
Man trap
Answers
B.
Biometric device
B.
Biometric device
Answers
C.
Host Intrusion Detection System (HIDS)
C.
Host Intrusion Detection System (HIDS)
Answers
D.
Network Intrusion Detection System (NIDS)
D.
Network Intrusion Detection System (NIDS)
Answers
Suggested answer: A

Which of the following refers to a location away from the computer center where document copies and backup media are kept?

A.
Storage Area network
A.
Storage Area network
Answers
B.
Off-site storage
B.
Off-site storage
Answers
C.
On-site storage
C.
On-site storage
Answers
D.
Network attached storage
D.
Network attached storage
Answers
Suggested answer: B

Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two.

A.
Public key
A.
Public key
Answers
B.
IPsec
B.
IPsec
Answers
C.
MS-CHAP
C.
MS-CHAP
Answers
D.
Symmetric
D.
Symmetric
Answers
Suggested answer: A, D

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

A.
Email spoofing
A.
Email spoofing
Answers
B.
Social engineering
B.
Social engineering
Answers
C.
Web ripping
C.
Web ripping
Answers
D.
Steganography
D.
Steganography
Answers
Suggested answer: D

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

A.
Network-based
A.
Network-based
Answers
B.
Anomaly-based
B.
Anomaly-based
Answers
C.
File-based
C.
File-based
Answers
D.
Signature-based
D.
Signature-based
Answers
Suggested answer: B

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

A.
Estimate the potential losses to assets by determining their value.
A.
Estimate the potential losses to assets by determining their value.
Answers
B.
Establish the threats likelihood and regularity.
B.
Establish the threats likelihood and regularity.
Answers
C.
Valuations of the critical assets in hard costs.
C.
Valuations of the critical assets in hard costs.
Answers
D.
Evaluate potential threats to the assets.
D.
Evaluate potential threats to the assets.
Answers
Suggested answer: A, B, D
Total 237 questions
Go to page: of 24