Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 2 out of 13 pages
Viewing questions 11-20 out of questions
Questions # 11:

A company needs to protect its confidential data from unauthorized access which logical control is best suited for this scenario

Options:

A.

Encryption


B.

Firewall


C.

Antivirus


D.

Hashing


Expert Solution
Questions # 12:

How many bits represent the organization unique identifier (oui) in mac addresses?

Options:

A.

16 Bits


B.

48 Bits


C.

24 Bits


D.

32 Bits


Expert Solution
Questions # 13:

A common network device used to filter traffic?

Options:

A.

Server


B.

Endpoint


C.

Ethernet


D.

Firewa


Expert Solution
Questions # 14:

The documentation of a predetermined set of instructions or procedures to detect, respond to andlimit consequences of a malicious cyberattack against an organization's information systems(s).

Options:

A.

IR


B.

IRP


C.

BCP


D.

DRP


Expert Solution
Questions # 15:

Port used in DNS

Options:

A.

53


B.

80


C.

45


D.

54


Expert Solution
Questions # 16:

Exhibit.

Question # 16

IPSec works in which layer of OSI Model

Options:

A.

Layer 2


B.

Layer 5


C.

Layer 3


D.

Layer 7


Expert Solution
Questions # 17:

Which of the following is a common security measure to prevent Cross Site Scripting (XSS) attacks in web applications?

Options:

A.

implementing strong password policies


B.

using a firewall to block incoming traffic


C.

validating and sanitizing user input (Correct)


D.

encrypting data during transmission


Expert Solution
Questions # 18:

The common term used to describe the mechanisms that control the temperature and humidity in a data center

Options:

A.

VLAN (virtual local area network)


B.

STAT (system temperature and timing)


C.

TAWC (temperature and water control)


D.

HVAC (heating, ventilation and air conditioning)


Expert Solution
Questions # 19:

Type 1 authentication posses

Options:

A.

Users may share their credential with others


B.

User may forgot their passwords


C.

Passwords may be intercepted and stolen


D.

ALL


Expert Solution
Questions # 20:

If a device is found that is not compliant with the security baseline, what will be the security team action

Options:

A.

Report


B.

Evaluate


C.

Ignore


D.

Disabled or isolated into a quarantine area until it can be checked and updated.


Expert Solution
Viewing page 2 out of 13 pages
Viewing questions 11-20 out of questions