CISSP-ISSAP Dumps

CISSP-ISSAP Free Practice Test

ISC2 CISSP-ISSAP: Information Systems Security Architecture Professional

QUESTION 21

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.

Correct Answer: BD

QUESTION 22

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ABD

QUESTION 23

In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?

Correct Answer: A

QUESTION 24

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?

Correct Answer: B

QUESTION 25

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

Correct Answer: BC