Go Back on ISSAP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

ISSAP Practice Test


Page 15 out of 48 Pages

Topic 1: Volume A

In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.


A. Public-key cryptography


B. Kerberos


C. Preshared keys


D. Digital certificates





B.
  Kerberos

C.
  Preshared keys

D.
  Digital certificates

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?


A. Spoofing


B. Packet sniffing


C. Tunneling


D. Packet filtering





C.
  Tunneling

Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?


A. Cipher feedback mode


B. Cipher block chaining mode


C. Output feedback mode


D. Electronic codebook mode





D.
  Electronic codebook mode

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?


A. Blowfish


B. Twofish


C. RSA


D. Diffie-Hellman





D.
  Diffie-Hellman

You work as a Security Manager for Tech Perfect Inc. A number of people are involved with you in the DRP efforts. You have maintained several different types of plan documents, intended for different audiences. Which of the following documents will be useful for you as well as public relations personnel who require a non-technical perspective on the entire organization's disaster recovery efforts?


A. Technical guide


B. Executive summary


C. Checklist


D. Department-specific plan





B.
  Executive summary


Page 15 out of 48 Pages
Previous