ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

A.
AES
A.
AES
Answers
B.
SHA
B.
SHA
Answers
C.
MD5
C.
MD5
Answers
D.
DES
D.
DES
Answers
Suggested answer: C

Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.

A.
Using public key infrastructure authentication.
A.
Using public key infrastructure authentication.
Answers
B.
Using basic authentication.
B.
Using basic authentication.
Answers
C.
Using Secret keys for authentication.
C.
Using Secret keys for authentication.
Answers
D.
Using Off-channel verification.
D.
Using Off-channel verification.
Answers
Suggested answer: A, C, D

Which of the following is an electrical event shows that there is enough power on the grid to prevent from a total power loss but there is no enough power to meet the current electrical demand?

A.
Power Surge
A.
Power Surge
Answers
B.
Power Spike
B.
Power Spike
Answers
C.
Blackout
C.
Blackout
Answers
D.
Brownout
D.
Brownout
Answers
Suggested answer: D

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

A.
PPP
A.
PPP
Answers
B.
X.25
B.
X.25
Answers
C.
Frame relay
C.
Frame relay
Answers
D.
SLIP
D.
SLIP
Answers
Suggested answer: C

Which of the following statements best describes a certification authority?

A.
A certification authority is a technique to authenticate digital documents by using computer cryptography.
A.
A certification authority is a technique to authenticate digital documents by using computer cryptography.
Answers
B.
A certification authority is a type of encryption that uses a public key and a private key pair for data encryption.
B.
A certification authority is a type of encryption that uses a public key and a private key pair for data encryption.
Answers
C.
A certification authority is an entity that issues digital certificates for use by other parties.
C.
A certification authority is an entity that issues digital certificates for use by other parties.
Answers
D.
A certification authority is a type of encryption that uses a single key to encrypt and decrypt data.
D.
A certification authority is a type of encryption that uses a single key to encrypt and decrypt data.
Answers
Suggested answer: C

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

A.
Hot Site
A.
Hot Site
Answers
B.
Mobile Site
B.
Mobile Site
Answers
C.
Warm Site
C.
Warm Site
Answers
D.
Cold Site
D.
Cold Site
Answers
Suggested answer: A

Which of the following should the administrator ensure during the test of a disaster recovery plan?

A.
Ensure that the plan works properly
A.
Ensure that the plan works properly
Answers
B.
Ensure that all the servers in the organization are shut down.
B.
Ensure that all the servers in the organization are shut down.
Answers
C.
Ensure that each member of the disaster recovery team is aware of their responsibility.
C.
Ensure that each member of the disaster recovery team is aware of their responsibility.
Answers
D.
Ensure that all client computers in the organization are shut down.
D.
Ensure that all client computers in the organization are shut down.
Answers
Suggested answer: A, C

The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.

A.
Disaster recovery planning
A.
Disaster recovery planning
Answers
B.
SOA value proposition
B.
SOA value proposition
Answers
C.
Software assets reuse
C.
Software assets reuse
Answers
D.
Architectural components abstraction
D.
Architectural components abstraction
Answers
E.
Business traceability
E.
Business traceability
Answers
Suggested answer: B, C, D, E

You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the following networking devices will you use to accomplish the task?

A.
Hub
A.
Hub
Answers
B.
Switch
B.
Switch
Answers
C.
Repeater
C.
Repeater
Answers
D.
Router
D.
Router
Answers
Suggested answer: C

In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.

A.
Public-key cryptography
A.
Public-key cryptography
Answers
B.
Kerberos
B.
Kerberos
Answers
C.
Preshared keys
C.
Preshared keys
Answers
D.
Digital certificates
D.
Digital certificates
Answers
Suggested answer: B, C, D
Total 237 questions
Go to page: of 24