ISC2 CISSP-ISSAP.pdf
Q: 1
The network you administer allows owners of objects to manage the access to those objects via
access control lists. This is an example of what type of access control?
Options
Q: 2
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The
company has two offices in different cities. The company wants to connect the two offices by using a
public network. You decide to configure a virtual private network (VPN) between the offices. Which
of the following protocols is used by VPN for tunneling?
Options
Q: 3
John works as a security manager for SoftTech Inc. He is working with his team on the disaster
recovery management plan. One of his team members has a doubt related to the most cost effective
DRP testing plan. According to you, which of the following disaster recovery testing plans is the most
cost-effective and efficient way to identify areas of overlap in the plan before conducting more
demanding training exercises?
Options
Q: 4
In which of the following SDLC phases are the software and other components of the system
faithfully incorporated into the design specifications?
Options
Q: 5
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you
want to discuss it with your team members for getting appropriate responses of the disaster. In
which of the following disaster recovery tests can this task be performed?
Options
Q: 6
Which of the following heights of fence deters only casual trespassers?
Options
Q: 7
In which of the following types of tests are the disaster recovery checklists distributed to the
members of disaster recovery team and asked to review the assigned checklist?
Options
Q: 8
Which of the following encryption modes has the property to allow many error correcting codes to
function normally even when applied before encryption?
Options
Q: 9
Which of the following is an electrical event shows that there is enough power on the grid to prevent
from a total power loss but there is no enough power to meet the current electrical demand?
Options
Q: 10
Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?
Options
Question 1 of 10