PrepAway - Latest Free Exam Questions & Answers

Category: CISSP-ISSAP (v.1)

Exam CISSP-ISSAP: ISSAP Information Systems Security Architecture Professional (updat February, 19th 2015)

Which of the following types of authentication mechanism is used here?

Adam
works as a Network Administrator. He discovers that the wireless AP transmits 128 bytes of
plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting
ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network
traffic. Which of the following types of authentication mechanism is used here?

which of the following disaster recovery testing plans is the most cost-effective and efficient way to identif

John
works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery
management plan. One of his team members has a doubt related to the most cost effective DRP
testing plan. According to you, which of the following disaster recovery testing plans is the most
cost-effective and efficient way to identify areas of overlap in the plan before conducting more
demanding training
exercises?


Page 11 of 25« First...910111213...20...Last »