Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 10 out of 13 pages
Viewing questions 91-100 out of questions
Questions # 91:

What is the primary purpose of a honeytoken in cybersecurity?

Options:

A.

To lure and detect attackers


B.

To encrypt sensitive data


C.

To enhance network performance


D.

To manage user access


Expert Solution
Questions # 92:

Which is the Not the component of a Business Continuity (BC) plan

Options:

A.

Immediate response procedures and checklists


B.

Notification systems and call trees for alerting personnel


C.

Guidance for management, including designation of authority for specific managers


D.

Manacomont


Expert Solution
Questions # 93:

What does the concept of integrity applied to

Options:

A.

Organization


B.

Information system and processes for business operations


C.

People


D.

ALL


Expert Solution
Questions # 94:

Which of the following cloud service models provides the most suitable environment for customers to build and operate their own software?

Options:

A.

SaaS


B.

laaS


C.

PaaS


Expert Solution
Questions # 95:

The Bell and LaPadula access control model is a form of

Options:

A.

RBAC


B.

MAC


C.

DAC


D.

ABAC


Expert Solution
Questions # 96:

A company wants to ensure that its employees cannot bring unauthorized electronic devices into the workspace which physical control is best suited for this

Options:

A.

Metal Detectors


B.

Security gaurds


C.

RFID scanners


D.

Baggage X-ray machinces


Expert Solution
Questions # 97:

While taking the certification exam for ISC2 CC, You notice another candidate for the certification cheating. What should you do?

Options:

A.

Yell at the other candidate for violating test security.


B.

Nothing—each person is responsible for their own actions.


C.

Report the candidate to ISC2.


D.

Call local law enforcement.


Expert Solution
Questions # 98:

Which of the following is unlikely to be a member of the disaster recovery team

Options:

A.

Executive Management


B.

Public Relations


C.

Billing Clerk


D.

IT personnel


Expert Solution
Questions # 99:

1________is a weighted factor based on a subjective analysis of the probability

that a given threat or set of threats is capable of exploiting a given vulnerability or set of vulnerabilities.

Options:

A.

Likelihood of occurrence


B.

Threat Vector


C.

Risk


D.

Impact


Expert Solution
Questions # 100:

Example of Type 1 Authentication

Options:

A.

Password


B.

Smart Card


C.

Finger Print


D.

RSA Token


Expert Solution
Viewing page 10 out of 13 pages
Viewing questions 91-100 out of questions