CISSP-ISSAP : Information Systems Security Architecture Professional : Part 01

  1. You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?

    • BitLocker
    • Smart Cards 
    • Service Accounts
    • AppLocker
  2. In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?

    • Initiation
    • Programming and training
    • Design
    • Evaluation and acceptance
  3. Which of the following encryption modes has the property to allow many error correcting codes to function normally even when applied before encryption?

    • OFB mode 
    • CFB mode
    • CBC mode
    • PCBC mode
  4. You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.

    • MAC filtering the router
    • Not broadcasting SSID
    • Using WEP encryption
    • Using WPA encryption
  5. Which of the following uses public key cryptography to encrypt the contents of files?

    • EFS 
    • DFS
    • NTFS
    • RFS
  6. Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.

    • DES
    • Blowfish
    • RC5
    • Diffie-Hellman
  7. Which of the following protocols provides the highest level of VPN security with a VPN connection that uses the L2TP protocol?

    • IPSec 
    • PPPoE
    • PPP
    • TFTP
  8. Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

    • Data encrypted with the secret key can only be decrypted by another secret key.
    • The secret key can encrypt a message, and anyone with the public key can decrypt it. 
    • The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.
    • Data encrypted by the public key can only be decrypted by the secret key.
  9. Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

    • Firewall
    • NAT
    • MAC address
    • IPSec
  10. You work as a Security Manager for Tech Perfect Inc. A number of people are involved with you in the DRP efforts. You have maintained several different types of plan documents, intended for different audiences. Which of the following documents will be useful for you as well as public relations personnel who require a non-technical perspective on the entire organization’s disaster recovery efforts?

    • Technical guide
    • Executive summary 
    • Checklist
    • Department-specific plan
  11. Which of the following backup types backs up files that have been added and all data that have been modified since the most recent backup was performed?

    • Differential backup
    • Incremental backup 
    • Daily backup
    • Full backup
  12. Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.

    • Authenticity 
    • Globalization
    • Mobility
    • Integrity
    • Confidentiality
    • Nonrepudiation
  13. In which of the following cryptographic attacking techniques does the attacker pick up the information to be encrypted and take a copy of it with the encrypted data?

    • Chosen ciphertext attack
    • Known plaintext attack
    • Chosen plaintext attack 
    • Ciphertext only attack
  14. You are responsible for security at a hospital. Since many computers are accessed by multiple employees 24 hours a day, 7 days a week, controlling physical access to computers is very difficult. This is compounded by a high number of non employees moving through the building. You are concerned about unauthorized access to patient records. What would best solve this problem?

    • The use of CHAP.
    • Time of day restrictions.
    • The use of smart cards. 
    • Video surveillance of all computers.
  15. An access control secures the confidentiality, integrity, and availability of the information and data of an organization. In which of the following categories can you deploy the access control? Each correct answer represents a part of the solution. Choose all that apply.

    • Detective access control
    • Corrective access control
    • Administrative access control
    • Preventive access control
  16. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose three.

    • It hides the internal IP addressing scheme. 
    • It protects network from the password guessing attacks.
    • It is used to connect private networks to the public Internet.
    • It shares public Internet addresses with a large number of internal network clients.
  17. Which of the following encryption algorithms is used by the Clipper chip, which supports the escrowed encryption standard?

    • Skipjack 
    • Blowfish
    • AES
    • IDEA
  18. Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

    • Kerberos
    • Cryptography
    • Cryptographer
    • Cryptanalysis
  19. An organization has implemented a hierarchical-based concept of privilege management in which administrators have full access, HR managers have less permission than the administrators, and data entry operators have no access to resources. Which of the following access control models is implemented in the organization?

    • Role-based access control (RBAC) 
    • Network-based access control (NBAC)
    • Mandatory Access Control (MAC)
    • Discretionary access control (DAC)
  20. Access control systems enable an authority to control access to areas and resources in a given physical facility or computer-based information system. Which of the following services provided by access control systems is used to determine what a subject can do?

    • Authentication
    • Authorization 
    • Accountability
    • Identification
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments