Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the most important aspect of security awareness and training?

Options:

A.

Maximizing business capabilities


B.

Protecting assets


C.

Protecting health and human safety


D.

Ensuring confidentiality of data


Expert Solution
Questions # 2:

What is the primary goal of a risk management process in cybersecurity?

Options:

A.

Eliminate all risks


B.

Transfer all risks


C.

Identify, assess, and mitigate risks to an acceptable level


D.

Ignore risks


Expert Solution
Questions # 3:

Example of a technical control:

Options:

A.

Security guard


B.

GPS installed in a vehicle to track location


C.

Door lock


D.

None


Expert Solution
Questions # 4:

An external entity has tried to gain access to your organization’s IT environment without authorization. This is an example of a(n):

Options:

A.

Exploit


B.

Intrusion


C.

Event


D.

Malware


Expert Solution
Questions # 5:

A method for risk analysis that is based on the assignment of a descriptor such as low, medium, or high.

Options:

A.

Quantitative Risk Analysis


B.

Risk Assessment


C.

Risk Mitigation


D.

Qualitative Risk Analysis


Expert Solution
Questions # 6:

Four main components of Incident Response are:

Options:

A.

Preparation, Detection and Analysis, Containment, Eradication and Recovery


B.

Preparation, Detection, Analysis and Containment


C.

Detection, Analysis, Containment, Eradication and Recovery


D.

All


Expert Solution
Questions # 7:

Exhibit.

Question # 7

How many keys would be required to support 50 users in an asymmetric cryptography system?

Options:

A.

100


B.

200


C.

50


D.

1225


Expert Solution
Questions # 8:

Which of the following is the LEAST secure communications protocol?

Options:

A.

CHAP


B.

IPsec


C.

PAP


D.

EAP


Expert Solution
Questions # 9:

Which one of the following controls is NOT particularly effective against the insider threat?

Options:

A.

Least privilege


B.

Background checks


C.

Firewalls


D.

Separation of duties


Expert Solution
Questions # 10:

What is the first step in incident response planning?

Options:

A.

Develop a management-approved policy


B.

Identify critical systems


C.

Train staff


D.

Form the IR team


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions