PrepAway - Latest Free Exam Questions & Answers

Category: CISSP-ISSAP

Exam CISSP-ISSAP: ISSAP Information Systems Security Architecture Professional

Which of the following protocols is used by VPN for tunneling?

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network.
The company has two offices in different cities. The company wants to connect the two offices by
using a public network. You decide to configure a virtual private network (VPN) between the
offices. Which of the following protocols is used by VPN for tunneling?

Which of the following topologies should John use to accomplish the task?

John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based
network. John has been assigned a project to build a network for the sales department of the
company. It is important for the LAN to continue working even if there is a break in the cabling.
Which of the following topologies should John use to accomplish the task?

Which of the following types of authentication mechanism is used here?

Adam works as a Network Administrator. He discovers that the wireless AP transmits 128 bytes of
plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting
ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network
traffic. Which of the following types of authentication mechanism is used here?


Page 10 of 24« First...89101112...20...Last »