Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 1 out of 13 pages
Viewing questions 1-10 out of questions
Questions # 1:

Who must follow HIPAA Compliance

Options:

A.

Energy Sector


B.

Health Care


C.

Finance Sector


D.

ALL


Expert Solution
Questions # 2:

Networks are often micro segmented networks, with firewalls at nearly every connecting point

Options:

A.

DMZ


B.

VPN


C.

VLAN


D.

Zero Trust


Expert Solution
Questions # 3:

A company network experience a sudden flood of network packets that causes major slowdown in internet traffic. What type of event it this?

Options:

A.

Security incident


B.

Natural disaster


C.

Exploit


D.

Adverse event


Expert Solution
Questions # 4:

An entity that acts to exploit a target organizations system vulnerabilities is a

Options:

A.

Attacker


B.

Threat vector


C.

Threat


D.

Threat Actor


Expert Solution
Questions # 5:

Which of the following principles aims primarily at fraud detection

Options:

A.

Defense in depth


B.

Least privilege


C.

Separation of duties


D.

Privileged account


Expert Solution
Questions # 6:

The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.)

Options:

A.

DDOS


B.

Authetication


C.

Authentication


D.

Availablity


Expert Solution
Questions # 7:

An IP network protocol standardized by the Internet Engineering Task Force (IETF) through RFC 792 to determine if a particular service or host is available.

Options:

A.

IP


B.

ICMP


C.

IGMP


D.

HTTP


Expert Solution
Questions # 8:

Which of the following attacks can TLS help mitigate?

Options:

A.

Cross-site Scripting (XSS) Attacks


B.

Social Engineering Attacks


C.

Man-in-the-middle (MiTm) Attacks (Correct)


D.

SQL Injection Attacks


Expert Solution
Questions # 9:

A security event, or combination of security events, that constitutes a secu incident in which an intruder gains, or attempts to gain, access to a system or system resource without authorization

Options:

A.

Intrusion


B.

Exploit


C.

Threat


D.

Attack


Expert Solution
Questions # 10:

Mark is configuring an automated data transfer between two hosts and is choosing an authentication technique for one host to connect to the other host. What approach would be best-suited for this scenario?

Options:

A.

Biometric


B.

Smart Card


C.

SSH Key


D.

Hard Coded Password


Expert Solution
Viewing page 1 out of 13 pages
Viewing questions 1-10 out of questions