ISC2 Information Systems Security Architecture Professional CISSP-ISSAP Exam Practice Test

Page:    1 / 14   
Total 249 questions

Question 1

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography?

Each correct answer represents a complete solution. Choose all that apply.



Answer : A, B, D

Question 2

Which of the following are types of access control attacks?

Each correct answer represents a complete solution. Choose all that apply.



Answer : B, C, D

Question 3

Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?



Answer : B

Question 4

Which of the following is a form of gate that allows one person to pass at a time?



Answer : C

Question 5

Which of the following algorithms can be used to check the integrity of a file?

Each correct answer represents a complete solution. Choose two.



Answer : A, D

Page:    1 / 14   
Total 249 questions