We provide real CISSP-ISSAP exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass ISC2 CISSP-ISSAP Exam quickly & easily. The CISSP-ISSAP PDF type is available for reading and printing. You can print more and practice many times. With the help of our ISC2 CISSP-ISSAP dumps pdf and vce product and material, you can easily pass the CISSP-ISSAP exam.
NEW QUESTION 1
Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.
Answer: ABC
NEW QUESTION 2
Which of the following ports must be opened on the firewall for the VPN connection using Point-to- Point Tunneling Protocol (PPTP)?
Answer: D
NEW QUESTION 3
An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?
Answer: C
NEW QUESTION 4
Which of the following authentication methods is based on physical appearance of a user?
Answer: B
NEW QUESTION 5
You work as a Chief Security Officer for Tech Perfect Inc. The company has a TCP/IP based network. You want to use a firewall that can track the state of active connections of the network and then determine which network packets are allowed to enter through the firewall. Which of the following firewalls has this feature?
Answer: C
NEW QUESTION 6
Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?
Answer: A
NEW QUESTION 7
Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.
Answer: BCD
NEW QUESTION 8
Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?
Answer: D
NEW QUESTION 9
A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?
Answer: A
NEW QUESTION 10
Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a regular occurrence. Which of the following will you tell her to use to protect her computer?
Answer: A
NEW QUESTION 11
Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?
Answer: D
NEW QUESTION 12
The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet- filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information? Each correct answer represents a complete solution. Choose all that apply.
Answer: AD
NEW QUESTION 13
What are the benefits of using AAA security service in a network? Each correct answer represents a part of the solution. Choose all that apply.
Answer: ACD
NEW QUESTION 14
Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.
Answer: CD
NEW QUESTION 15
Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?
Answer: B
NEW QUESTION 16
CORRECT TEXT
In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?
Answer: A
NEW QUESTION 17
You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?
Answer: A
NEW QUESTION 18
You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security reasons. The manager of the company tells you to establish connectivity between clients and servers of the network which prevents eavesdropping and tampering of data on the Internet. Which of the following will you configure on the network to perform the given task?
Answer: D
NEW QUESTION 19
In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?
Answer: A
NEW QUESTION 20
Which of the following firewalls inspects the actual contents of packets?
Answer: C
NEW QUESTION 21
In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?
Answer: A
NEW QUESTION 22
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer represents a part of the solution. Choose three.
Answer: ABC
NEW QUESTION 23
Which of the following uses public key cryptography to encrypt the contents of files?
Answer: A
NEW QUESTION 24
In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?
Answer: B
NEW QUESTION 25
Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.
Answer: ADEF
NEW QUESTION 26
You work as a Network Administrator for McRoberts Inc. You are expanding your company's network. After you have implemented the network, you test the connectivity to a remote host by using the PING command. You get the ICMP echo reply message from the remote host. Which of the following layers of the OSI model are tested through this process? Each correct answer represents a complete solution. Choose all that apply.
Answer: ABD
NEW QUESTION 27
Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.
Answer: BC
NEW QUESTION 28
You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the following networking devices will you use to accomplish the task?
Answer: C
NEW QUESTION 29
The OSI reference model is divided into layers and each layer has a specific task to perform. At which layer of OSI model is the File and Print service performed?
Answer: D
NEW QUESTION 30
......
Thanks for reading the newest CISSP-ISSAP exam dumps! We recommend you to try the PREMIUM Simply pass CISSP-ISSAP dumps in VCE and PDF here: https://www.simply-pass.com/ISC2-exam/CISSP-ISSAP-dumps.html (237 Q&As Dumps)