Go Back on ISSAP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

ISSAP Practice Test


Page 7 out of 48 Pages

Topic 2: Volume B

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?


A. Integrity


B. Availability


C. Authenticity


D. Confidentiality





D.
  Confidentiality

Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.


A. It typically executes at a higher speed than a block cipher.


B. It divides a message into blocks for processing.


C. It typically executes at a slower speed than a block cipher.


D. It divides a message into bits for processing.


E. It is a symmetric key cipher.





A.
  It typically executes at a higher speed than a block cipher.

D.
  It divides a message into bits for processing.

E.
  It is a symmetric key cipher.

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol? Each correct answer represents a complete solution. Choose all that apply.


A. TIS authentication


B. Rhosts (rsh-style) authentication


C. Kerberos authentication


D. Password-based authentication





A.
  TIS authentication

B.
  Rhosts (rsh-style) authentication

C.
  Kerberos authentication

Which of the following protocols uses public-key cryptography to authenticate the remote computer?


A. SSH


B. Telnet


C. SCP


D. SSL





A.
  SSH

In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?


A. Gap analysis


B. Requirement analysis


C. Cost-benefit analysis


D. Vulnerability analysis





A.
  Gap analysis


Page 7 out of 48 Pages
Previous