Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 11 out of 13 pages
Viewing questions 101-110 out of questions
Questions # 101:

Which uses encrypted, machine-generated codes to verify a user's identity.

Options:

A.

Basic Authentication


B.

Form Based Authentication


C.

Token Based Authentication


D.

AII


Expert Solution
Questions # 102:

Which of the following is not a protocol of the OSI layer 3

Options:

A.

IGMP


B.

IP


C.

ICMP


D.

SSH


Expert Solution
Questions # 103:

The last phase in the data security cycle is

Options:

A.

Encryption


B.

Destruction


C.

Archival


D.

Backup


Expert Solution
Questions # 104:

What is the primary goal of the incident management team in the organization

Options:

A.

Reduce the impact and resore services


B.

Gathering and analyzing information


C.

Conducting Leason learn meeting


D.

RCA of the impact


Expert Solution
Questions # 105:

Which of the following is a systematic approach to protecting against cyber threats that involves a continuous cycle of identifying, assessing and prioritizing risks and implementing measures to reduce or eliminate those risks?

Options:

A.

Security Assessment


B.

Incident response


C.

Peneteration testing


D.

Risk Management


Expert Solution
Questions # 106:

Embedded systems and network-enabled devices that communicate with the internet are considered as

Options:

A.

Endpoint


B.

Node


C.

IOT


D.

Router


Expert Solution
Questions # 107:

What is the primary goal of incident management

Options:

A.

To potect life health and safety


B.

To reduce the impacrt of an incident


C.

To prepare for any incident


D.

To resume interrupted operations as soon as possible


Expert Solution
Questions # 108:

Which is strongly used for Securing Wi-Fi

Options:

A.

WPA2


B.

WEP


C.

WPA


D.

SSL


Expert Solution
Questions # 109:

Requires that all instances of the data be identical in form,

Options:

A.

Confidentiality


B.

Availability


C.

Consistency


D.

ALL


Expert Solution
Questions # 110:

In DAC, the policy specifies that a subject who has been granted access to information can do the following:

Options:

A.

Change security attributes on subjects, objects, information systems or system components


B.

Choose the security attributes to be associated with newly created or revised objects


C.

Change the rules governing access control


D.

ALL


Expert Solution
Viewing page 11 out of 13 pages
Viewing questions 101-110 out of questions