ExamGecko
Home Home / ISC / CISSP-ISSAP

ISC CISSP-ISSAP Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.

A.
In order to digitally sign an electronic record, a person must use his/her public key.
A.
In order to digitally sign an electronic record, a person must use his/her public key.
Answers
B.
In order to verify a digital signature, the signer's private key must be used.
B.
In order to verify a digital signature, the signer's private key must be used.
Answers
C.
In order to digitally sign an electronic record, a person must use his/her private key.
C.
In order to digitally sign an electronic record, a person must use his/her private key.
Answers
D.
In order to verify a digital signature, the signer's public key must be used.
D.
In order to verify a digital signature, the signer's public key must be used.
Answers
Suggested answer: C, D

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

A.
Mutual
A.
Mutual
Answers
B.
Anonymous
B.
Anonymous
Answers
C.
Multi-factor
C.
Multi-factor
Answers
D.
Biometrics
D.
Biometrics
Answers
Suggested answer: C

You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?

A.
Eradication
A.
Eradication
Answers
B.
Identification
B.
Identification
Answers
C.
Recovery
C.
Recovery
Answers
D.
Containment
D.
Containment
Answers
Suggested answer: A

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

A.
Discretionary Access Control (DAC)
A.
Discretionary Access Control (DAC)
Answers
B.
Role Based Access Control (RBAC)
B.
Role Based Access Control (RBAC)
Answers
C.
Mandatory Access Control (MAC)
C.
Mandatory Access Control (MAC)
Answers
D.
Access Control List (ACL)
D.
Access Control List (ACL)
Answers
Suggested answer: C

Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?

A.
ESP
A.
ESP
Answers
B.
AH
B.
AH
Answers
C.
IKE
C.
IKE
Answers
D.
ISAKMP
D.
ISAKMP
Answers
Suggested answer: B

The network you administer allows owners of objects to manage the access to those objects via access control lists. This is an example of what type of access control?

A.
RBAC
A.
RBAC
Answers
B.
MAC
B.
MAC
Answers
C.
CIA
C.
CIA
Answers
D.
DAC
D.
DAC
Answers
Suggested answer: D

Which of the following processes is used to identify relationships between mission critical applications, processes, and operations and all supporting elements?

A.
Critical path analysis
A.
Critical path analysis
Answers
B.
Functional analysis
B.
Functional analysis
Answers
C.
Risk analysis
C.
Risk analysis
Answers
D.
Business impact analysis
D.
Business impact analysis
Answers
Suggested answer: A

Which of the following devices is a least expensive power protection device for filtering the electrical stream to control power surges, noise, power sags, and power spikes?

A.
Line Conditioner
A.
Line Conditioner
Answers
B.
Surge Suppressor
B.
Surge Suppressor
Answers
C.
Uninterrupted Power Supply (UPS)
C.
Uninterrupted Power Supply (UPS)
Answers
D.
Expansion Bus
D.
Expansion Bus
Answers
Suggested answer: C

You work as a Project Manager for Tech Perfect Inc. You are creating a document which emphasizes the formal study of what your organization is doing currently and where it will be in the future. Which of the following analysis will help you in accomplishing the task?

A.
Cost-benefit analysis
A.
Cost-benefit analysis
Answers
B.
Gap analysis
B.
Gap analysis
Answers
C.
Requirement analysis
C.
Requirement analysis
Answers
D.
Vulnerability analysis
D.
Vulnerability analysis
Answers
Suggested answer: B

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.

A.
Blowfish
A.
Blowfish
Answers
B.
DES
B.
DES
Answers
C.
IDEA
C.
IDEA
Answers
D.
RC4
D.
RC4
Answers
Suggested answer: A, B, C
Total 237 questions
Go to page: of 24