ISC2 ISSAP Information Systems Security Architecture Professional CISSP-ISSAP Exam Practice Test

Page: 1 / 14
Total 237 questions
Question 1

You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?



Answer : B


Question 2

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.



Answer : C, D


Question 3

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?



Answer : C


Question 4

Which of the following encryption algorithms are based on block ciphers?



Answer : B, C, D


Question 5

Which of the following authentication methods prevents unauthorized execution of code on remote systems?



Answer : B


Question 6

Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.



Answer : B, C


Question 7

A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.



Answer : C, D


Page:    1 / 14   
Total 237 questions