Go Back on ISSAP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

ISSAP Practice Test


Page 9 out of 48 Pages

Topic 2: Volume B

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?


A. Stateful firewall


B. Host-based application firewall


C. A network-based application layer firewall


D. An application firewall





A.
  Stateful firewall

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?


A. CHAP


B. PEAP


C. EAP


D. EAP-TLS





A.
  CHAP

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?


A. TRACERT


B. PING


C. IPCONFIG


D. NSLOOKUP





D.
  NSLOOKUP

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?


A. Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer


B. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer


C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer


D. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer





D.
  Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?


A. Detective access control


B. Physical access control


C. Technical access control


D. Administrative access control





B.
  Physical access control


Page 9 out of 48 Pages
Previous