CISSP-ISSAP : Information Systems Security Architecture Professional : Part 06

  1. Which of the following protocols supports encapsulation of encrypted packets in secure wrappers that can be transmitted over a TCP/IP connection?

    • PPTP 
    • UDP
    • IPSec
    • PAP
  2. Which of the following protocols should a Chief Security Officer configure in the network of his company to protect sessionless datagram protocols?

    • SWIPE
    • S/MIME
    • SKIP 
    • SLIP
  3. Which of the following decides access control on an object in the mandatory access control (MAC) environment? 

    • Sensitivity label 
    • Event log
    • System Access Control List (SACL)
    • Security log
  4. John works as an Ethical Hacker for company Inc. He wants to find out the ports that are open in company’s server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?

    • TCP FIN
    • Xmas tree
    • TCP SYN/ACK
    • TCP SYN
  5. SIMULATION

    Fill in the blank with the appropriate phrase. The is a simple document that provides a high-level view of the entire organization’s disaster recovery efforts.

    • Executive summary
  6. Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.

    • Water
    • CO2
    • Halon
    • Soda acid
  7. Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

    • Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer
    • Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer
    • application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
    • Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer
  8. You work as a Chief Security Officer for Tech Perfect Inc. You have configured IPSec and ISAKMP protocol in the company’s network in order to establish a secure communication infrastructure. According to the Internet RFC 2408, which of the following services does the ISAKMP protocol offer to the network? Each correct answer represents a part of the solution. Choose all that apply. 

    • It relies upon a system of security associations.
    • It provides key generation mechanisms.
    • It authenticates communicating peers.
    • It protects against threats, such as DoS attack, replay attack, etc.
  9. You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

    • Identification
    • Eradication
    • Recovery
    • Contamination
    • Preparation
  10. The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Which of the following components does the PKI use to list those certificates that have been revoked or are no longer valid?

    • Certification Practice Statement
    • Certificate Policy
    • Certificate Revocation List 
    • Certification Authority
  11. Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?

    • Service-oriented modeling framework (SOMF) 
    • Service-oriented modeling and architecture (SOMA)
    • Sherwood Applied Business Security Architecture (SABSA)
    • Service-oriented architecture (SOA)
  12. Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?

    • Detective access control
    • Physical access control 
    • Technical access control
    • Administrative access control
  13. You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?

    • Repeater
    • Bridge
    • Switch 
    • Router
  14. Which of the following layers of the OSI model provides non-repudiation services?

    • The application layer 
    • The data-link layer
    • The presentation layer
    • The physical layer
  15. Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

    • PMK
    • PTK
    • PKI 
    • GTK
  16. Which of the following authentication methods is based on physical appearance of a user?

    • Key fob
    • Biometrics 
    • ID/password combination
    • Smart card
  17. Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

    • Domain Controller
    • Certificate User
    • Certification Authority 
    • Internet Authentication Server
  18. Which of the following algorithms is found to be suitable for both digital signature and encryption?

    • SHA-1
    • MD5
    • AES
    • RSA
  19. Mark works as a Network Administrator for NetTech Inc. He wants to connect the company’s headquarter and its regional offices using a WAN technology. For this, he uses packet-switched connection. Which of the following WAN technologies will Mark use to connect the offices? Each correct answer represents a complete solution. Choose two.

    • ISDN
    • X.25
    • Frame Relay
    • Leased line
  20. Which of the following types of halon is found in portable extinguishers and is stored as a liquid?

    • Halon-f
    • Halon 1301
    • Halon 11
    • Halon 1211
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments