Go Back on ISSAP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

ISSAP Practice Test


Page 10 out of 48 Pages

Topic 2: Volume B

Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.


A. Authenticity


B. Globalization


C. Mobility


D. Integrity


E. Confidentiality


F. Nonrepudiation





A.
  Authenticity

D.
  Integrity

E.
  Confidentiality

F.
  Nonrepudiation

Which of the following is an input device that is used for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius lawn mowers?


A. PS/2


B. Joystick


C. Microphone


D. AGP





B.
  Joystick

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?


A. Risk analysis


B. OODA loop


C. Cryptography


D. Firewall security





C.
  Cryptography

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering? Each correct answer represents a complete solution. Choose two.


A. Reduce power consumption


B. Ease of maintenance


C. Failover


D. Load balancing





A.
  Reduce power consumption

B.
  Ease of maintenance

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?


A. Kerberos


B. Cryptography


C. Cryptographer


D. Cryptanalysis





D.
  Cryptanalysis


Page 10 out of 48 Pages
Previous