ISC2
ISSAP
Q1:
Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?
○
A
Asymmetric○
B
Hashing○
C
Numeric○
D
Symmetric
ISC2
ISSAP
Q2:
Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?
○
A
PEAP○
B
EAP-TLS○
C
WEP○
D
EAP-FAST
ISC2
ISSAP
Q3:
Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.
☐
A
Dictionary attack☐
B
Mail bombing☐
C
Spoofing☐
D
Brute force attack
ISC2
ISSAP
Q4:
Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.
☐
A
Block cipher☐
B
Stream cipher☐
C
Transposition cipher☐
D
Message Authentication Code
ISC2
ISSAP
Q5:
Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?
○
A
Service-oriented modeling framework (SOMF)○
B
Service-oriented modeling and architecture (SOMA)○
C
Sherwood Applied Business Security Architecture (SABSA)○
D
Service-oriented architecture (SOA)