ISSAP Practice Test Questions

237 Questions


Topic 2: Volume B

Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.


A. Access control





A.
  Access control

Which of the following is an electrical event shows that there is enough power on the grid to prevent from a total power loss but there is no enough power to meet the current electrical demand?


A. Power Surge


B. Power Spike


C. Blackout


D. Brownout





D.
  Brownout

Fill in the blank with the appropriate security device. ___________ is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view.


A. Motion detector





A.
  Motion detector

Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message?


A. Cipher


B. CrypTool


C. Steganography


D. MIME





A.
  Cipher

Which of the following types of halon is found in portable extinguishers and is stored as a liquid?


A. Halon-f


B. Halon 1301


C. Halon 11


D. Halon 1211





D.
  Halon 1211

You are the Network Administrator at a large company. Your company has a lot of contractors and other outside parties that come in and out of the building. For this reason you are concerned that simply having usernames and passwords is not enough and want to have employees use tokens for authentication. Which of the following is not an example of tokens?


A. Smart card


B. USB device with cryptographic data


C. CHAP


D. Key fob





C.
  CHAP

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e- mails. Which of the following will you use to accomplish this?


A. PGP


B. PPTP


C. IPSec


D. NTFS





A.
  PGP

Which of the following is a form of gate that allows one person to pass at a time?


A. Biometric


B. Man-trap


C. Turnstile


D. Fence





C.
  Turnstile

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?


A. Sensor


B. Alarm


C. Motion detector


D. Badge





D.
  Badge

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?


A. Key card


B. Biometric devices


C. Intrusion detection systems


D. CCTV Cameras





D.
  CCTV Cameras

You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?


A. Repeater


B. Bridge


C. Switch


D. Router





C.
  Switch

Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?


A. ESP


B. AH


C. IKE


D. ISAKMP





B.
  AH


Page 1 out of 20 Pages