ExamGecko
Home / ISC / CISSP-ISSAP / List of questions
Ask Question

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 8

Add to Whishlist

List of questions

Question 71

Report Export Collapse

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.

Become a Premium Member for full access
  Unlock Premium Member

Question 72

Report Export Collapse

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution.

Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 73

Report Export Collapse

An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 74

Report Export Collapse

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password. What type of attack has just occurred?

Become a Premium Member for full access
  Unlock Premium Member

Question 75

Report Export Collapse

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Become a Premium Member for full access
  Unlock Premium Member

Question 76

Report Export Collapse

The IPSec protocol is configured in an organization's network in order to maintain a complete infrastructure for secured network communications. IPSec uses four components for this. Which of the following components reduces the size of data transmitted over congested network connections and increases the speed of such networks without losing data?

Become a Premium Member for full access
  Unlock Premium Member

Question 77

Report Export Collapse

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks?

Become a Premium Member for full access
  Unlock Premium Member

Question 78

Report Export Collapse

A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution.

Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 79

Report Export Collapse

Which of the following is an input device that is used for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius lawn mowers?

Become a Premium Member for full access
  Unlock Premium Member

Question 80

Report Export Collapse

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Become a Premium Member for full access
  Unlock Premium Member
Total 237 questions
Go to page: of 24
Search

Related questions