ISC CISSP-ISSAP - ISSAP Information Systems Security Architecture Professional Exam
Page: 2 / 48
Total 237 questions
Question #6 (Topic: Topic 1)
Which of the following electrical events shows a sudden drop of power source that can
cause a wide variety of problems on a PC or a network?
cause a wide variety of problems on a PC or a network?
A. Blackout
B. Power spike
C. Power sag
D. Power surge
Answer: A
Question #7 (Topic: Topic 1)
Which of the following is an input device that is used for controlling machines such as
cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and
zero turning radius lawn mowers?
cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and
zero turning radius lawn mowers?
A. PS/2
B. Joystick
C. Microphone
D. AGP
Answer: B
Question #8 (Topic: Topic 1)
The IPSec protocol is configured in an organization's network in order to maintain a
complete infrastructure for secured network communications. IPSec uses four components
for this. Which of the following components reduces the size of data transmitted over
congested network connections and increases the speed of such networks without losing
data?
complete infrastructure for secured network communications. IPSec uses four components
for this. Which of the following components reduces the size of data transmitted over
congested network connections and increases the speed of such networks without losing
data?
A. AH
B. ESP
C. IPcomp
D. IKE
Answer: C
Question #9 (Topic: Topic 1)
A helpdesk technician received a phone call from an administrator at a remote branch
office. The administrator claimed to have forgotten the password for the root account on
UNIX servers and asked for it. Although the technician didn't know any administrator at the
branch office, the guy sounded really friendly and since he knew the root password himself,
he supplied the caller with the password. What type of attack has just occurred?
office. The administrator claimed to have forgotten the password for the root account on
UNIX servers and asked for it. Although the technician didn't know any administrator at the
branch office, the guy sounded really friendly and since he knew the root password himself,
he supplied the caller with the password. What type of attack has just occurred?
A. Social Engineering attack
B. Brute Force attack
C. War dialing attack
D. Replay attack
Answer: A
Question #10 (Topic: Topic 1)
Which of the following statements best describes a certification authority?
A. A certification authority is a technique to authenticate digital documents by using computer cryptography.
B. A certification authority is a type of encryption that uses a public key and a private key pair for data encryption.
C. A certification authority is an entity that issues digital certificates for use by other parties.
D. A certification authority is a type of encryption that uses a single key to encrypt and decrypt data.
Answer: C