CISSP-ISSAP : Information Systems Security Architecture Professional : Part 07

  1. Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.

    • It uses symmetric key pairs.
    • It provides security using data encryption and digital signature.
    • It uses asymmetric key pairs.
    • It is a digital representation of information that identifies users.
  2. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

    • Risk analysis
    • OODA loop
    • Cryptography 
    • Firewall security
  3. Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

    • SPAP
    • MSCHAP
    • PAP 
    • MSCHAP V2
  4. You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?

    • AES
    • SHA 
    • EAP
    • CRC32
  5. In which of the following network topologies does the data travel around a loop in a single direction and pass through each device? 

    • Ring topology 
    • Tree topology
    • Star topology
    • Mesh topology
  6. Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

    • Structured walk-through test
    • Simulation test
    • Full-interruption test 
    • Parallel test
  7. Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

    • RCO
    • RTO 
    • RPO
    • RTA
  8. Which of the following electrical events shows a sudden drop of power source that can cause a wide variety of problems on a PC or a network?

    • Blackout 
    • Power spike
    • Power sag
    • Power surge
  9. John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

    • Blowfish
    • Twofish
    • RSA
    • Diffie-Hellman
  10. You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

    • Containment 
    • Preparation
    • Recovery
    • Identification
  11. Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

    • CHAP 
    • PEAP
    • EAP
    • EAP-TLS
  12. You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company’s intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

    • Microsoft Internet Information Server (IIS)
    • VPN
    • FTP server
    • Certificate server
  13. You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.

    • Parking lot
    • All hallways
    • Server Rooms 
    • All offices
    • All entrance doors
  14. Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

    • Man trap 
    • Biometric device
    • Host Intrusion Detection System (HIDS)
    • Network Intrusion Detection System (NIDS)
  15. Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

    • User’s group
    • File and data ownership 
    • Smart card
    • Access rights and permissions
  16. An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the public key from a user’s certificate. Which of the following processes fulfills the above requirements?

    • Key escrow 
    • Key storage
    • Key revocation
    • Key recovery
  17. Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet? 

    • Risk analysis
    • Firewall security
    • Cryptography 
    • OODA loop
  18. Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?

    • Cipher feedback mode
    • Cipher block chaining mode
    • Output feedback mode
    • Electronic codebook mode
  19. You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?

    • Smart card access to all areas with computers.
    • Use laptop locks. 
    • Video surveillance on all areas with computers.
    • Appoint a security guard.
  20. Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

    • The transport layer 
    • The presentation layer
    • The session layer
    • The application layer
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments