aiotestking uk

CISSP-ISSAP Exam Questions - Online Test


CISSP-ISSAP Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

We provide real CISSP-ISSAP exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass ISC2 CISSP-ISSAP Exam quickly & easily. The CISSP-ISSAP PDF type is available for reading and printing. You can print more and practice many times. With the help of our ISC2 CISSP-ISSAP dumps pdf and vce product and material, you can easily pass the CISSP-ISSAP exam.

NEW QUESTION 1
Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.

  • A. DES
  • B. Blowfish
  • C. RC5
  • D. Diffie-Hellman

Answer: ABC

NEW QUESTION 2
Which of the following ports must be opened on the firewall for the VPN connection using Point-to- Point Tunneling Protocol (PPTP)?

  • A. TCP port 110
  • B. TCP port 443
  • C. TCP port 5060
  • D. TCP port 1723

Answer: D

NEW QUESTION 3
An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

  • A. Electronic vaulting
  • B. Remote journaling
  • C. Remote mirroring
  • D. Transaction logging

Answer: C

NEW QUESTION 4
Which of the following authentication methods is based on physical appearance of a user?

  • A. Key fob
  • B. Biometrics
  • C. ID/password combination
  • D. Smart card

Answer: B

NEW QUESTION 5
You work as a Chief Security Officer for Tech Perfect Inc. The company has a TCP/IP based network. You want to use a firewall that can track the state of active connections of the network and then determine which network packets are allowed to enter through the firewall. Which of the following firewalls has this feature?

  • A. Stateful packet inspection firewall
  • B. Proxy-based firewall
  • C. Dynamic packet-filtering firewall
  • D. Application gateway firewall

Answer: C

NEW QUESTION 6
Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?

  • A. Service-oriented modeling framework (SOMF)
  • B. Service-oriented modeling and architecture (SOMA)
  • C. Sherwood Applied Business Security Architecture (SABSA)
  • D. Service-oriented architecture (SOA)

Answer: A

NEW QUESTION 7
Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.

  • A. Dictionary attack
  • B. Mail bombing
  • C. Spoofing
  • D. Brute force attack

Answer: BCD

NEW QUESTION 8
Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

  • A. Integrity
  • B. Confidentiality
  • C. Authentication
  • D. Non-repudiation

Answer: D

NEW QUESTION 9
A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

  • A. Denial-of-Service attack
  • B. Vulnerability attack
  • C. Social Engineering attack
  • D. Impersonation attack

Answer: A

NEW QUESTION 10
Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a regular occurrence. Which of the following will you tell her to use to protect her computer?

  • A. UPS
  • B. Multimeter
  • C. SMPS
  • D. CMOS battery

Answer: A

NEW QUESTION 11
Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?

  • A. ARP
  • B. ICMP
  • C. TCP
  • D. IGMP

Answer: D

NEW QUESTION 12
The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet- filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information? Each correct answer represents a complete solution. Choose all that apply.

  • A. Transport layer
  • B. Physical layer
  • C. Data Link layer
  • D. Network layer

Answer: AD

NEW QUESTION 13
What are the benefits of using AAA security service in a network? Each correct answer represents a part of the solution. Choose all that apply.

  • A. It provides scalabilit
  • B. It supports a single backup syste
  • C. It increases flexibility and control of access configuratio
  • D. It supports RADIUS, TACACS+, and Kerberos authentication method

Answer: ACD

NEW QUESTION 14
Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.

  • A. Synchronous
  • B. Secret
  • C. Asymmetric
  • D. Symmetric

Answer: CD

NEW QUESTION 15
Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?

  • A. Port forwarding
  • B. NAT
  • C. MAC filtering
  • D. Firewall

Answer: B

NEW QUESTION 16
CORRECT TEXT
In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

  • A. Hot Site
  • B. Mobile Site
  • C. Warm Site
  • D. Cold Site

Answer: A

NEW QUESTION 17
You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?

  • A. Implement a sign in sheet at the main entrance and route all traffic through ther
  • B. Have all people entering the building use smart cards for acces
  • C. Implement biometric acces
  • D. Implement cameras at all entrance

Answer: A

NEW QUESTION 18
You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security reasons. The manager of the company tells you to establish connectivity between clients and servers of the network which prevents eavesdropping and tampering of data on the Internet. Which of the following will you configure on the network to perform the given task?

  • A. WEP
  • B. IPsec
  • C. VPN
  • D. SSL

Answer: D

NEW QUESTION 19
In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?

  • A. Gap analysis
  • B. Requirement analysis
  • C. Cost-benefit analysis
  • D. Vulnerability analysis

Answer: A

NEW QUESTION 20
Which of the following firewalls inspects the actual contents of packets?

  • A. Packet filtering firewall
  • B. Stateful inspection firewall
  • C. Application-level firewall
  • D. Circuit-level firewall

Answer: C

NEW QUESTION 21
In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?

  • A. Ring topology
  • B. Tree topology
  • C. Star topology
  • D. Mesh topology

Answer: A

NEW QUESTION 22
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer represents a part of the solution. Choose three.

  • A. Guarantee the reliability of standby systems through testing and simulatio
  • B. Protect an organization from major computer services failur
  • C. Minimize the risk to the organization from delays in providing service
  • D. Maximize the decision-making required by personnel during a disaste

Answer: ABC

NEW QUESTION 23
Which of the following uses public key cryptography to encrypt the contents of files?

  • A. EFS
  • B. DFS
  • C. NTFS
  • D. RFS

Answer: A

NEW QUESTION 24
In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?

  • A. Initiation
  • B. Programming and training
  • C. Design
  • D. Evaluation and acceptance

Answer: B

NEW QUESTION 25
Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.

  • A. Authenticity
  • B. Globalization
  • C. Mobility
  • D. Integrity
  • E. Confidentiality
  • F. Nonrepudiation

Answer: ADEF

NEW QUESTION 26
You work as a Network Administrator for McRoberts Inc. You are expanding your company's network. After you have implemented the network, you test the connectivity to a remote host by using the PING command. You get the ICMP echo reply message from the remote host. Which of the following layers of the OSI model are tested through this process? Each correct answer represents a complete solution. Choose all that apply.

  • A. Layer 3
  • B. Layer 2
  • C. Layer 4
  • D. Layer 1

Answer: ABD

NEW QUESTION 27
Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.

  • A. It uses symmetric key pair
  • B. It provides security using data encryption and digital signatur
  • C. It uses asymmetric key pair
  • D. It is a digital representation of information that identifies user

Answer: BC

NEW QUESTION 28
You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the following networking devices will you use to accomplish the task?

  • A. Hub
  • B. Switch
  • C. Repeater
  • D. Router

Answer: C

NEW QUESTION 29
The OSI reference model is divided into layers and each layer has a specific task to perform. At which layer of OSI model is the File and Print service performed?

  • A. Session layer
  • B. Presentation layer
  • C. Transport layer
  • D. Application layer

Answer: D

NEW QUESTION 30
......

Thanks for reading the newest CISSP-ISSAP exam dumps! We recommend you to try the PREMIUM Simply pass CISSP-ISSAP dumps in VCE and PDF here: https://www.simply-pass.com/ISC2-exam/CISSP-ISSAP-dumps.html (237 Q&As Dumps)