Go Back on ISSAP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

ISSAP Practice Test


Page 8 out of 48 Pages

Topic 2: Volume B

In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?


A. Chosen plaintext attack


B. Ciphertext only attack


C. Chosen ciphertext attack


D. Known plaintext attack





B.
  Ciphertext only attack

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password. What type of attack has just occurred?


A. Social Engineering attack


B. Brute Force attack


C. War dialing attack


D. Replay attack





A.
  Social Engineering attack

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?


A. Microsoft Internet Information Server (IIS)


B. VPN


C. FTP server


D. Certificate server





D.
  Certificate server

You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant. Which algorithm are they most likely using for hashing?


A. PKI


B. SHA


C. Kerberos


D. MD5





D.
  MD5

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?


A. Denial-of-Service attack


B. Vulnerability attack


C. Social Engineering attack


D. Impersonation attack





A.
  Denial-of-Service attack


Page 8 out of 48 Pages
Previous