Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions
Questions # 11:

Port used by DNS.

Options:

A.

53


B.

80


C.

45


D.

54


Expert Solution
Questions # 12:

Which of the following protocols is a secure alternative to using Telnet?

Options:

A.

SSH


B.

HTTPS


C.

SFTP


D.

LDAPS


Expert Solution
Questions # 13:

What is the main purpose of using multi-factor authentication (MFA) in a security system?

Options:

A.

To prevent data breaches


B.

To protect against malware


C.

To ensure data integrity


D.

To add an extra layer of security to user authentication


Expert Solution
Questions # 14:

VLAN hopping belongs to which OSI layer?

Options:

A.

Layer 3


B.

Layer 4


C.

Layer 7


D.

Layer 2


Expert Solution
Questions # 15:

Restoring IT and communications after a disruption is the goal of:

Options:

A.

BCP


B.

IRP


C.

DRP


D.

None


Expert Solution
Questions # 16:

Firewalls operate at which OSI layers?

Options:

A.

Layer 3


B.

Layer 4


C.

Layer 7


D.

All


Expert Solution
Questions # 17:

A CISO documents a policy establishing acceptable cloud use for all staff. This is an example of:

Options:

A.

Technical control


B.

Physical control


C.

Cloud control


D.

Management / Administrative control


Expert Solution
Questions # 18:

What does the term “Two-factor authentication” refer to in cybersecurity?

Options:

A.

Using two different antivirus programs


B.

Verifying identity with two independent factors


C.

Accessing two different networks simultaneously


D.

Changing passwords every two weeks


Expert Solution
Questions # 19:

Why is security training important?

Options:

A.

Because it fulfills regulatory requirements


B.

Because it helps people perform job duties more efficiently


C.

Because it reduces the risk of attacks such as social engineering


D.

All


Expert Solution
Questions # 20:

A scam where a malicious website is made to look exactly like a trusted site is called:

Options:

A.

DoS


B.

Virus


C.

Spoofing


D.

Phishing


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions