Go Back on ISSAP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

ISSAP Practice Test


Page 5 out of 48 Pages

Topic 2: Volume B

Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?


A. CHAP


B. PAP


C. Kerberos


D. TACACS





C.
  Kerberos

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.


A. Block cipher


B. Stream cipher


C. Transposition cipher


D. Message Authentication Code





A.
  Block cipher

B.
  Stream cipher

D.
  Message Authentication Code

Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?


A. Asymmetric encryption


B. Symmetric encryption


C. S/MIME


D. PGP





B.
  Symmetric encryption

You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?


A. Smart card access to all areas with computers.


B. Use laptop locks.


C. Video surveillance on all areas with computers.


D. Appoint a security guard.





B.
  Use laptop locks.

Which of the following types of firewall functions at the Session layer of OSI model?


A. Circuit-level firewall


B. Application-level firewall


C. Packet filtering firewall


D. Switch-level firewall





A.
  Circuit-level firewall


Page 5 out of 48 Pages
Previous