Exambible CISSP-ISSAP Questions are updated and all CISSP-ISSAP answers are verified by experts. Once you have completely prepared with our CISSP-ISSAP exam prep kits you will be ready for the real CISSP-ISSAP exam without a problem. We have Refresh ISC2 CISSP-ISSAP dumps study guide. PASSED CISSP-ISSAP First attempt! Here What I Did.

Q49. Which of the following should the administrator ensure during the test of a disaster recovery plan? 

A. Ensure that the plan works properly 

B. Ensure that all the servers in the organization are shut down. 

C. Ensure that each member of the disaster recovery team is aware of their responsibility. 

D. Ensure that all client computers in the organization are shut down. 

Answer: A,C 


Q50. Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function? 

A. CHAP 

B. PEAP 

C. EAP 

D. EAP-TLS 

Answer:


Q51. Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access? 

A. SPAP 

B. MSCHAP 

C. PAP 

D. MSCHAP V2 

Answer:


Q52. You work as a Project Manager for Tech Perfect Inc. You are creating a document which emphasizes the formal study of what your organization is doing currently and where it will be in the future. Which of the following analysis will help you in accomplishing the task? 

A. Cost-benefit analysis 

B. Gap analysis 

C. Requirement analysis 

D. Vulnerability analysis 

Answer:


Q53. The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet- filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information? Each correct answer represents a complete solution. Choose all that apply. 

A. Transport layer 

B. Physical layer 

C. Data Link layer 

D. Network layer 

Answer: A,D 


Q54. Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution. Choose all that apply. 

A. Kerberos requires continuous availability of a central server. 

B. Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords. 

C. Kerberos builds on Asymmetric key cryptography and requires a trusted third party. 

D. Kerberos requires the clocks of the involved hosts to be synchronized. 

Answer: A,B,D 


Q55. Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three. 

A. It typically executes at a higher speed than a block cipher. 

B. It divides a message into blocks for processing. 

C. It typically executes at a slower speed than a block cipher. 

D. It divides a message into bits for processing. 

E. It is a symmetric key cipher. 

Answer: A,D,E 


Q56. Which of the following firewalls inspects the actual contents of packets? 

A. Packet filtering firewall 

B. Stateful inspection firewall 

C. Application-level firewall 

D. Circuit-level firewall 

Answer: