ExamGecko
Home / ISC / CISSP-ISSAP / List of questions
Ask Question

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

Become a Premium Member for full access
  Unlock Premium Member

Question 62

Report Export Collapse

Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 63

Report Export Collapse

Which of the following is an electrical event shows that there is enough power on the grid to prevent from a total power loss but there is no enough power to meet the current electrical demand?

Become a Premium Member for full access
  Unlock Premium Member

Question 64

Report Export Collapse

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

Become a Premium Member for full access
  Unlock Premium Member

Question 65

Report Export Collapse

Which of the following statements best describes a certification authority?

Become a Premium Member for full access
  Unlock Premium Member

Question 66

Report Export Collapse

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

Become a Premium Member for full access
  Unlock Premium Member

Question 67

Report Export Collapse

Which of the following should the administrator ensure during the test of a disaster recovery plan?

Become a Premium Member for full access
  Unlock Premium Member

Question 68

Report Export Collapse

The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 69

Report Export Collapse

You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the following networking devices will you use to accomplish the task?

Become a Premium Member for full access
  Unlock Premium Member

Question 70

Report Export Collapse

In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member
Total 237 questions
Go to page: of 24
Search

Related questions