Your success in ISC2 CISSP-ISSAP is our sole target and we develop all our CISSP-ISSAP braindumps in a way that facilitates the attainment of this target. Not only is our CISSP-ISSAP study material the best you can find, it is also the most detailed and the most updated. CISSP-ISSAP Practice Exams for ISC2 CISSP-ISSAP are written to the highest standards of technical accuracy.

Q41. You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this? 

A. Smart card access to all areas with computers. 

B. Use laptop locks. 

C. Video surveillance on all areas with computers. 

D. Appoint a security guard. 

Answer:


Q42. John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task? 

A. Star 

B. Mesh 

C. Bus 

D. Ring 

Answer:


Q43. An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization? 

A. Electronic vaulting 

B. Remote journaling 

C. Remote mirroring 

D. Transaction logging 

Answer:


Q44. You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use? 

A. AES 

B. SHA 

C. MD5 

D. DES 

Answer:


Q45. CORRECT TEXT 

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility? 

A. Hot Site 

B. Mobile Site 

C. Warm Site 

D. Cold Site 

Answer:


Q46. Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two. 

A. Synchronous 

B. Secret 

C. Asymmetric 

D. Symmetric 

Answer: C,D 


Q47. The OSI model is the most common networking model used in the industry. Applications, network functions, and protocols are typically referenced using one or more of the seven OSI layers. Of the following, choose the two best statements that describe the OSI layer functions. Each correct answer represents a complete solution. Choose two. 

A. Layers 1 and 2 deal with application functionality and data formatting. These layers reside at the top of the model. 

B. Layers 4 through 7 define the functionality of IP Addressing, Physical Standards, and Data Link protocols. 

C. Layers 5, 6, and 7 focus on the Network Application, which includes data formatting and session control. 

D. Layers 1, 2, 3, and 4 deal with physical connectivity, encapsulation, IP Addressing, and Error Recovery. These layers define the end-to-end functions of data delivery. 

Answer: C,D 


Q48. You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem? 

A. TRACERT 

B. PING 

C. IPCONFIG 

D. NSLOOKUP 

Answer: