CISSP-ISSAP Quiz Questions and Answers

Which of the following statements about Discretionary Access Control List (DACL) is true?

Answer :
  • It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.

____ is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view.

Answer :
  • Motion detector

Which of the following categories of access controls is deployed in the organization to prevent all direct contact with systems?

Answer :
  • Physical access control

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Answer :
  • • Denial-of-Service attack

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

Answer :
  • • Badge

Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.

Answer :
  • RADIUS
  • TACACS+

Which of the following types of attacks cannot be prevented by technical measures only?

Answer :
  • Social engineering

Which of the following is used to authenticate asymmetric keys?

Answer :
  • Digital signature

IPsec VPN provides a high degree of data privacy by establishing trust points between A. MD5 B. LEAP C. AES D. 3DES communicating devices and data encryption. Which of the following encryption methods does IPsec VPN use? Each correct answer represents a complete solution. Choose two.

Answer :
  • • C,D

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?

Answer :
  • • PGP