Go Back on ISSAP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

ISSAP Practice Test


Page 6 out of 48 Pages

Topic 1: Volume A

Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?


A. RSTP


B. SKIP


C. OCSP


D. HTTP





C.
  OCSP

Which of the following cables provides maximum security against electronic eavesdropping on a network?


A. Fibre optic cable


B. STP cable


C. UTP cable


D. NTP cable





A.
  Fibre optic cable

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.


A. Data service


B. Ticket-granting service


C. Account service


D. Authentication service





B.
  Ticket-granting service

D.
  Authentication service

Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?


A. SMTP service


B. Terminal service


C. Directory service


D. DFS service





C.
  Directory service

A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.


A. In order to digitally sign an electronic record, a person must use his/her public key.


B. In order to verify a digital signature, the signer's private key must be used.


C. In order to digitally sign an electronic record, a person must use his/her private key.


D. In order to verify a digital signature, the signer's public key must be used.





C.
  In order to digitally sign an electronic record, a person must use his/her private key.

D.
  In order to verify a digital signature, the signer's public key must be used.


Page 6 out of 48 Pages
Previous