Go Back on ISSAP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

ISSAP Practice Test


Page 11 out of 48 Pages

Topic 1: Volume A

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?


A. Mutual


B. Anonymous


C. Multi-factor


D. Biometrics





C.
  Multi-factor

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?


A. PMK


B. PTK


C. PKI


D. GTK





C.
  PKI

Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?


A. Disaster recovery plan


B. Contingency plan


C. Business continuity plan


D. Crisis communication plan





C.
  Business continuity plan

Which of the following protocols should a Chief Security Officer configure in the network of his company to protect sessionless datagram protocols?


A. SWIPE


B. S/MIME


C. SKIP


D. SLIP





C.
  SKIP

Which of the following firewalls inspects the actual contents of packets?


A. Packet filtering firewall


B. Stateful inspection firewall


C. Application-level firewall


D. Circuit-level firewall





C.
  Application-level firewall


Page 11 out of 48 Pages
Previous