ISSAP Practice Test Questions

237 Questions


Topic 2: Volume B

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering? Each correct answer represents a complete solution. Choose two.


A. Reduce power consumption


B. Ease of maintenance


C. Failover


D. Load balancing





A.
  Reduce power consumption

B.
  Ease of maintenance

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?


A. Kerberos


B. Cryptography


C. Cryptographer


D. Cryptanalysis





D.
  Cryptanalysis

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?


A. Mutual


B. Anonymous


C. Multi-factor


D. Biometrics





C.
  Multi-factor

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?


A. PMK


B. PTK


C. PKI


D. GTK





C.
  PKI

Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?


A. Disaster recovery plan


B. Contingency plan


C. Business continuity plan


D. Crisis communication plan





C.
  Business continuity plan

Which of the following protocols should a Chief Security Officer configure in the network of his company to protect sessionless datagram protocols?


A. SWIPE


B. S/MIME


C. SKIP


D. SLIP





C.
  SKIP

Which of the following firewalls inspects the actual contents of packets?


A. Packet filtering firewall


B. Stateful inspection firewall


C. Application-level firewall


D. Circuit-level firewall





C.
  Application-level firewall

Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?


A. Project gap


B. Product gap


C. Competitive gap


D. Usage gap





D.
  Usage gap

Single Loss Expectancy (SLE) represents an organization's loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?


A. SLE = Asset Value (AV) * Exposure Factor (EF)


B. SLE = Asset Value (AV) * Annualized Rate of Occurrence (ARO)


C. SLE = Annualized Loss Expectancy (ALE) * Annualized Rate of Occurrence (ARO)


D. SLE = Annualized Loss Expectancy (ALE) * Exposure Factor (EF)





A.
  SLE = Asset Value (AV) * Exposure Factor (EF)

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?


A. Hacking


B. Packet filtering


C. Web caching


D. Spoofing





B.
  Packet filtering

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites. Which of the following would protect against this?


A. MAC


B. Mutual authentication


C. Three factor authentication


D. Two factor authentication





B.
  Mutual authentication

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?


A. Policy Access Control


B. Mandatory Access Control


C. Discretionary Access Control


D. Role-Based Access Control





D.
  Role-Based Access Control


Page 5 out of 20 Pages
Previous