Download ISC.CISSP-ISSAP.PracticeTest.2017-12-21.237q.vcex

Download Exam

File Info

Exam Information Systems Security Architecture Professional
Number CISSP-ISSAP
File Name ISC.CISSP-ISSAP.PracticeTest.2017-12-21.237q.vcex
Size 153 KB
Posted Dec 21, 2017
Download ISC.CISSP-ISSAP.PracticeTest.2017-12-21.237q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?


  1. Project gap
  2. Product gap
  3. Competitive gap
  4. Usage gap
Correct answer: D



Question 2

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?


  1. Hacking
  2. Packet filtering
  3. Web caching
  4. Spoofing
Correct answer: B



Question 3

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?


  1. PGP
  2. PPTP
  3. IPSec
  4. NTFS
Correct answer: A



Question 4

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?


  1. IP Security (IPSec)
  2. Microsoft Point-to-Point Encryption (MPPE)
  3. Pretty Good Privacy (PGP)
  4. Data Encryption Standard (DES)
Correct answer: A



Question 5

Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?


  1. ARP
  2. ICMP
  3. TCP
  4. IGMP
Correct answer: D



Question 6

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?


  1. Sensor
  2. Alarm
  3. Motion detector
  4. Badge
Correct answer: D



Question 7

Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message?


  1. Cipher
  2. CrypTool
  3. Steganography
  4. MIME
Correct answer: A



Question 8

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?


  1. Policy Access Control
  2. Mandatory Access Control
  3. Discretionary Access Control
  4. Role-Based Access Control
Correct answer: D



Question 9

Which of the following is used to authenticate asymmetric keys?


  1. Digital signature
  2. MAC Address
  3. Demilitarized zone (DMZ)
  4. Password
Correct answer: A



Question 10

IPsec VPN provides a high degree of data privacy by establishing trust points between communicating devices and data encryption. Which of the following encryption methods does IPsec VPN use? Each correct answer represents a complete solution. Choose two.


  1. MD5
  2. LEAP
  3. AES
  4. 3DES
Correct answer: CD









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files