ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.

A.
Data service
A.
Data service
Answers
B.
Ticket-granting service
B.
Ticket-granting service
Answers
C.
Account service
C.
Account service
Answers
D.
Authentication service
D.
Authentication service
Answers
Suggested answer: B, D

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution.

Choose all that apply.

A.
Kerberos requires continuous availability of a central server.
A.
Kerberos requires continuous availability of a central server.
Answers
B.
Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.
B.
Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.
Answers
C.
Kerberos builds on Asymmetric key cryptography and requires a trusted third party.
C.
Kerberos builds on Asymmetric key cryptography and requires a trusted third party.
Answers
D.
Kerberos requires the clocks of the involved hosts to be synchronized.
D.
Kerberos requires the clocks of the involved hosts to be synchronized.
Answers
Suggested answer: A, B, D

An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

A.
Electronic vaulting
A.
Electronic vaulting
Answers
B.
Remote journaling
B.
Remote journaling
Answers
C.
Remote mirroring
C.
Remote mirroring
Answers
D.
Transaction logging
D.
Transaction logging
Answers
Suggested answer: C

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password. What type of attack has just occurred?

A.
Social Engineering attack
A.
Social Engineering attack
Answers
B.
Brute Force attack
B.
Brute Force attack
Answers
C.
War dialing attack
C.
War dialing attack
Answers
D.
Replay attack
D.
Replay attack
Answers
Suggested answer: A

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

A.
TRACERT
A.
TRACERT
Answers
B.
PING
B.
PING
Answers
C.
IPCONFIG
C.
IPCONFIG
Answers
D.
NSLOOKUP
D.
NSLOOKUP
Answers
Suggested answer: D

The IPSec protocol is configured in an organization's network in order to maintain a complete infrastructure for secured network communications. IPSec uses four components for this. Which of the following components reduces the size of data transmitted over congested network connections and increases the speed of such networks without losing data?

A.
AH
A.
AH
Answers
B.
ESP
B.
ESP
Answers
C.
IPcomp
C.
IPcomp
Answers
D.
IKE
D.
IKE
Answers
Suggested answer: C

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks?

A.
Service-oriented architecture
A.
Service-oriented architecture
Answers
B.
Sherwood Applied Business Security Architecture
B.
Sherwood Applied Business Security Architecture
Answers
C.
Service-oriented modeling framework
C.
Service-oriented modeling framework
Answers
D.
Service-oriented modeling and architecture
D.
Service-oriented modeling and architecture
Answers
Suggested answer: B

A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution.

Choose all that apply.

A.
A break in a network cable
A.
A break in a network cable
Answers
B.
75 ohm terminators at open ends
B.
75 ohm terminators at open ends
Answers
C.
A powered off workstation
C.
A powered off workstation
Answers
D.
An open-ended cable without terminators
D.
An open-ended cable without terminators
Answers
Suggested answer: A, B, D

Which of the following is an input device that is used for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius lawn mowers?

A.
PS/2
A.
PS/2
Answers
B.
Joystick
B.
Joystick
Answers
C.
Microphone
C.
Microphone
Answers
D.
AGP
D.
AGP
Answers
Suggested answer: B

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

A.
Buffer-overflow attack
A.
Buffer-overflow attack
Answers
B.
Man-in-the-middle attack
B.
Man-in-the-middle attack
Answers
C.
Shoulder surfing attack
C.
Shoulder surfing attack
Answers
D.
Denial-of-Service (DoS) attack
D.
Denial-of-Service (DoS) attack
Answers
Suggested answer: C
Total 237 questions
Go to page: of 24