ExamGecko
Home / ISC / CISSP-ISSAP / List of questions
Ask Question

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?

Become a Premium Member for full access
  Unlock Premium Member

Question 52

Report Export Collapse

Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?

Become a Premium Member for full access
  Unlock Premium Member

Question 53

Report Export Collapse

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

Become a Premium Member for full access
  Unlock Premium Member

Question 54

Report Export Collapse

An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the public key from a user's certificate. Which of the following processes fulfills the above requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 55

Report Export Collapse

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

Become a Premium Member for full access
  Unlock Premium Member

Question 56

Report Export Collapse

Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?

Become a Premium Member for full access
  Unlock Premium Member

Question 57

Report Export Collapse

You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?

Become a Premium Member for full access
  Unlock Premium Member

Question 58

Report Export Collapse

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

Become a Premium Member for full access
  Unlock Premium Member

Question 59

Report Export Collapse

You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?

Become a Premium Member for full access
  Unlock Premium Member

Question 60

Report Export Collapse

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?

Become a Premium Member for full access
  Unlock Premium Member
Total 237 questions
Go to page: of 24
Search

Related questions