Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which principle states that users should have access only to the specific data and resources needed to perform required tasks?

Options:

A.

Zero Trust


B.

Defense in Depth


C.

Least Privilege


D.

All


Expert Solution
Questions # 22:

Which is related to privacy?

Options:

A.

GDPR


B.

FIPS


C.

MOU


D.

All


Expert Solution
Questions # 23:

A security event in which an intruder gains or attempts unauthorized access to a system is called:

Options:

A.

Intrusion


B.

Exploit


C.

Threat


D.

Attack


Expert Solution
Questions # 24:

Which access control method uses attributes and rules evaluated by a central Policy Decision Point (PDP)?

Options:

A.

DAC


B.

RBAC


C.

MAC


D.

ABAC


Expert Solution
Questions # 25:

What is the potential impact of an IPSec replay attack?

Options:

A.

Modification of network traffic


B.

Disruption of network communication


C.

Unauthorized access to network resources


D.

All


Expert Solution
Questions # 26:

What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?

Options:

A.

Least privilege


B.

Two-person control


C.

Job rotation


D.

Separation of privileges


Expert Solution
Questions # 27:

What does Personally Identifiable Information (PII) pertain to?

Options:

A.

Information about an individual's health status


B.

Data about an individual that could be used to identify them


C.

Trade secrets, research, business plans, and intellectual property


D.

The importance assigned to information by its owner


Expert Solution
Questions # 28:

A weighted factor based on the probability that a threat will exploit a vulnerability is called:

Options:

A.

Likelihood of occurrence


B.

Threat vector


C.

Risk


D.

Impact


Expert Solution
Questions # 29:

Which document provides a high-level overview of a Disaster Recovery Plan?

Options:

A.

Technical guides


B.

Department-specific plans


C.

Full plan copies for team members


D.

Executive summary


Expert Solution
Questions # 30:

Limiting access based on data sensitivity and user authorization is known as:

Options:

A.

DAC


B.

MAC


C.

RuBAC


D.

RBAC


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions