ISC2 ISSAP Information Systems Security Architecture Professional CISSP-ISSAP Exam Practice Test

Page: 1 / 14
Total 237 questions
Question 1

Which of the following ports must be opened on the firewall for the VPN connection using Point-to-Point Tunneling Protocol (PPTP)?



Answer : D


Question 2

The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Which of the following components does the PKI use to list those certificates that have been revoked or are no longer valid?



Answer : C


Question 3

You work as a Chief Security Officer for Tech Perfect Inc. You have configured IPSec and ISAKMP protocol in the company's network in order to establish a secure communication infrastructure. ccording to the Internet RFC 2408, which of the following services does the ISAKMP protocol offer to the network? Each correct answer represents a part of the solution. Choose all that apply.



Answer : B, C, D


Question 4

Fill in the blank with the appropriate phrase. The is a simple document that provides a high-level view of the entire organization's disaster recovery efforts.



Answer : A


Question 5

Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.



Answer : B, C, D


Question 6

Which of the following layers of the OSI model provides non-repudiation services?



Answer : A


Question 7

John works as an Ethical Hacker for company Inc. He wants to find out the ports that are open in company's server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?



Answer : D


Page:    1 / 14   
Total 237 questions