Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 12 out of 13 pages
Viewing questions 111-120 out of questions
Questions # 111:

What is an IP address

Options:

A.

A physical address used to connect multiple devices in a network


B.

An address that denotes the vendor or manufacturer of the physical network interface


C.

A Logical address associated with a unique network interface within the network


D.

An Address that represents the network interface within the network


Expert Solution
Questions # 112:

Which type of application can intercept sensitive information such as passwords on a network segment?

Options:

A.

Log server


B.

Network Scanner


C.

Firewall


D.

Protocol Analyzer


Expert Solution
Questions # 113:

Modern solutions try to provide a more holistic approach detecting rootkits, ransomware and spyware.

Options:

A.

Antivirus


B.

IDS


C.

IPS


D.

Anti Malware


Expert Solution
Questions # 114:

Which of the following best describes the puposes of a business impact analysis?

Options:

A.

To document a predetermined set of instructions or procedures for restoring IT and communications services after a disruption


B.

To mitigate security violation and ensure that business operation can continue during a contigency


C.

To provide a high level overview of the disaster recovery plan


D.

To analyze an information systems requirements and functions in order to determine system contingency priorities


Expert Solution
Questions # 115:

Walmart has large ecommerce presence in world. Which of these solutions would ensure the LOWEST possible latency for their customers using their services?

Options:

A.

CDN


B.

SaaS


C.

Load Balancing


D.

Decentralized Data Centers


Expert Solution
Questions # 116:

What is a type of system architecture where a single instance can serve multiple distinct user groups.

Options:

A.

Mutli-threading


B.

Multi-processing


C.

Multitenancy


D.

Multi-cloud


Expert Solution
Questions # 117:

Type of cyber attack carried out over a LAN that involves sending malicious packets to a default gateway on a LAN

Options:

A.

ARP Poisoning


B.

Syn Flood


C.

Ping of death


D.

Trojan


Expert Solution
Questions # 118:

The Order of controls used in Defence in Depth

Options:

A.

Assests, Physical controls. Administrative Controls, Logical/Techincal Controls


B.

Assests, Administrative Controls, Physical controls, Logical/Techincal Controls


C.

Physical controls. Administrative Controls, Logical/Techincal Controls, Assests


D.

Assests, Administrative Controls, Logical/Techincal Controls, Physical controls


Expert Solution
Questions # 119:

The process of how an organization is managed; usually includes all aspects of how decisions are made for that organization

Options:

A.

Standard


B.

Policy


C.

Procedure


D.

Governance


Expert Solution
Questions # 120:

Provides confidentiality by hiding or obscuring a message so that it cannot be understood by anyone except the intended recipient.

Options:

A.

Hashing


B.

Encoding


C.

Cryptography


D.

AII


Expert Solution
Viewing page 12 out of 13 pages
Viewing questions 111-120 out of questions