ISC2 Information Systems Security Architecture Professional ISSAP CISSP-ISSAP Exam Practice Test

Page: 1 / 14
Total 237 questions
Question 1

Which of the following protocols supports encapsulation of encrypted packets in secure wrappers that can be transmitted over a TCP/IP connection?



Answer : A


Question 2

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password. What type of attack has just occurred?



Answer : A


Question 3

A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply.



Answer : A, B, D


Question 4

Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.



Answer : B, C


Question 5

Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?



Answer : C


Question 6

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.



Answer : B, D


Question 7

You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?



Answer : C


Page:    1 / 14   
Total 237 questions