Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CISSP-ISSAP Questions and Answers

Note! Following CISSP-ISSAP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

CISSP-ISSAP Questions and Answers

Question # 6

Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?

A.

SMTP service

B.

Terminal service

C.

Directory service

D.

DFS service

Full Access
Question # 7

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

A.

Authentication

B.

Non-repudiation

C.

Integrity

D.

Confidentiality

Full Access
Question # 8

Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?

A.

Pairwise Transient Key

B.

Group Temporal Key

C.

Private Key

D.

Pairwise Master Key

Full Access
Question # 9

Which of the following security protocols provides confidentiality, integrity, and authentication of network traffic with end-to-end and intermediate-hop security?

A.

IPSec

B.

SET

C.

SWIPE

D.

SKIP

Full Access
Question # 10

Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?

A.

Challenge Handshake Authentication Protocol (CHAP)

B.

Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

C.

Open Shortest Path First (OSPF)

D.

Extensible Authentication Protocol (EAP)

Full Access
Question # 11

Which of the following is a form of gate that allows one person to pass at a time?

A.

Biometric

B.

Man-trap

C.

Turnstile

D.

Fence

Full Access
Question # 12

Which of the following types of ciphers operates on a group of bits rather than an individual character or bit of a message?

A.

Block cipher

B.

Classical cipher

C.

Substitution cipher

D.

Stream cipher

Full Access
Question # 13

Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?

A.

PEAP

B.

EAP-TLS

C.

WEP

D.

EAP-FAST

Full Access
Question # 14

Which of the following heights of fence deters only casual trespassers?

A.

8 feet

B.

3 to 4 feet

C.

2 to 2.5 feet

D.

6 to 7 feet

Full Access
Question # 15

Which of the following life cycle modeling activities establishes service relationships and message exchange paths?

A.

Service-oriented logical design modeling

B.

Service-oriented conceptual architecture modeling

C.

Service-oriented discovery and analysis modeling

D.

Service-oriented business integration modeling

Full Access
Question # 16

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?

A.

Port forwarding

B.

NAT

C.

MAC filtering

D.

Firewall

Full Access
Question # 17

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.

A.

Blowfish

B.

DES

C.

IDEA

D.

RC4

Full Access
Question # 18

An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

A.

Electronic vaulting

B.

Remote journaling

C.

Remote mirroring

D.

Transaction logging

Full Access
Question # 19

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

A.

Blowfish

B.

Twofish

C.

RSA

D.

Diffie-Hellman

Full Access
Question # 20

Which of the following is an input device that is used for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius lawn mowers?

A.

PS/2

B.

Joystick

C.

Microphone

D.

AGP

Full Access
Question # 21

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?

A.

Biometric device

B.

One Time Password

C.

Proximity cards

D.

Security token

Full Access
Question # 22

You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?

A.

Bus topology

B.

Fully meshed topology

C.

Star topology

D.

Partially meshed topology

Full Access
Question # 23

Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?

A.

ARP

B.

ICMP

C.

TCP

D.

IGMP

Full Access
Question # 24

Which of the following firewalls inspects the actual contents of packets?

A.

Packet filtering firewall

B.

Stateful inspection firewall

C.

Application-level firewall

D.

Circuit-level firewall

Full Access
Question # 25

Which of the following types of attacks cannot be prevented by technical measures only?

A.

Social engineering

B.

Brute force

C.

Smurf DoS

D.

Ping flood attack

Full Access
Question # 26

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?

A.

PGP

B.

PPTP

C.

IPSec

D.

NTFS

Full Access
Question # 27

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility? A. Hot Site B. Mobile Site C. Warm Site D. Cold Site

Full Access
Question # 28

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.

A.

Data service

B.

Ticket-granting service

C.

Account service

D.

Authentication service

Full Access
Question # 29

Which of the following types of halon is found in portable extinguishers and is stored as a liquid?

A.

Halon-f

B.

Halon 1301

C.

Halon 11

D.

Halon 1211

Full Access
Question # 30

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

A.

PPP

B.

X.25

C.

Frame relay

D.

SLIP

Full Access
Question # 31

Which of the following refers to a location away from the computer center where document copies and backup media are kept?

A.

Storage Area network

B.

Off-site storage

C.

On-site storage

D.

Network attached storage

Full Access
Question # 32

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

A.

Containment

B.

Preparation

C.

Recovery

D.

Identification

Full Access
Question # 33

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A.

Risk analysis

B.

OODA loop

C.

Cryptography

D.

Firewall security

Full Access
Question # 34

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering? Each correct answer represents a complete solution. Choose two.

A.

Reduce power consumption

B.

Ease of maintenance

C.

Failover

D.

Load balancing

Full Access
Question # 35

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol? Each correct answer represents a complete solution. Choose all that apply.

A.

TIS authentication

B.

Rhosts (rsh-style) authentication

C.

Kerberos authentication

D.

Password-based authentication

Full Access