ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?

A.
IPSec
A.
IPSec
Answers
B.
L2TP
B.
L2TP
Answers
C.
LEAP
C.
LEAP
Answers
D.
ISAKMP
D.
ISAKMP
Answers
Suggested answer: D

Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?

A.
Asymmetric encryption
A.
Asymmetric encryption
Answers
B.
Symmetric encryption
B.
Symmetric encryption
Answers
C.
S/MIME
C.
S/MIME
Answers
D.
PGP
D.
PGP
Answers
Suggested answer: B

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A.
Risk analysis
A.
Risk analysis
Answers
B.
Firewall security
B.
Firewall security
Answers
C.
Cryptography
C.
Cryptography
Answers
D.
OODA loop
D.
OODA loop
Answers
Suggested answer: C

An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the public key from a user's certificate. Which of the following processes fulfills the above requirements?

A.
Key escrow
A.
Key escrow
Answers
B.
Key storage
B.
Key storage
Answers
C.
Key revocation
C.
Key revocation
Answers
D.
Key recovery
D.
Key recovery
Answers
Suggested answer: A

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

A.
User's group
A.
User's group
Answers
B.
File and data ownership
B.
File and data ownership
Answers
C.
Smart card
C.
Smart card
Answers
D.
Access rights and permissions
D.
Access rights and permissions
Answers
Suggested answer: B, D

Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?

A.
Cipher feedback mode
A.
Cipher feedback mode
Answers
B.
Cipher block chaining mode
B.
Cipher block chaining mode
Answers
C.
Output feedback mode
C.
Output feedback mode
Answers
D.
Electronic codebook mode
D.
Electronic codebook mode
Answers
Suggested answer: D

You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?

A.
Smart cards
A.
Smart cards
Answers
B.
Key fobs
B.
Key fobs
Answers
C.
VPN
C.
VPN
Answers
D.
Biometrics
D.
Biometrics
Answers
Suggested answer: B

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

A.
The transport layer
A.
The transport layer
Answers
B.
The presentation layer
B.
The presentation layer
Answers
C.
The session layer
C.
The session layer
Answers
D.
The application layer
D.
The application layer
Answers
Suggested answer: A

You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?

A.
Smart card access to all areas with computers.
A.
Smart card access to all areas with computers.
Answers
B.
Use laptop locks.
B.
Use laptop locks.
Answers
C.
Video surveillance on all areas with computers.
C.
Video surveillance on all areas with computers.
Answers
D.
Appoint a security guard.
D.
Appoint a security guard.
Answers
Suggested answer: B

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?

A.
Key card
A.
Key card
Answers
B.
Biometric devices
B.
Biometric devices
Answers
C.
Intrusion detection systems
C.
Intrusion detection systems
Answers
D.
CCTV Cameras
D.
CCTV Cameras
Answers
Suggested answer: D
Total 237 questions
Go to page: of 24