Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 3 out of 13 pages
Viewing questions 21-30 out of questions
Questions # 21:

John was recently offered a consulting opportunity as a side job. He is concerned that this might constitute a conflict of interest. Which one of the following sources that he needs to refer to take an appropriate decision?

Options:

A.

ISC2 Code of ethics


B.

Organizational code of ethics


C.

Country code of ethics


D.

Organizational security policy


Expert Solution
Questions # 22:

Sending employees to work at a customer's home can open your business to more risk of bodily injury or property damage claims. So, to reduce risk and avoid potential losses, you decide not to offer those kinds of services

Options:

A.

Risk Acceptance


B.

Risk Assessment


C.

Risk Avoidance


D.

Risk Control


Expert Solution
Questions # 23:

Which is an approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network.

Options:

A.

VLAN


B.

SDN


C.

VPN


D.

SAN


Expert Solution
Questions # 24:

What cybersecurity principle focuses on granting users only the privileges necessary to perform their job functions?

Options:

A.

Least privilege (Correct)


B.

defense in depth


C.

separation of duties


D.

need-to-know basis


Expert Solution
Questions # 25:

Security control used to protect against environmental threats such as fire, flood and earth quakes

Options:

A.

Physical control


B.

Logical Control


C.

Adminstrative Control


D.

Thechnical control


Expert Solution
Questions # 26:

Which Prevent crime by designing a physical environment that positively influences human behavior.

Options:

A.

DMZ


B.

Security Alarm


C.

CPTED


D.

CCTV


Expert Solution
Questions # 27:

What is the recommended fire suppression system for server rooms

Options:

A.

Foam based


B.

Water based


C.

Powder based


D.

ftac hacorl


Expert Solution
Questions # 28:

A one-way spinning door or barrier that allows only one person at a time to enter a building or pass through an area.

Options:

A.

Turnstile


B.

ManTrap


C.

Bollard


D.

Gate


Expert Solution
Questions # 29:

A hacker is trying to gain access to a company network which of the following scenarios would be an example of defense in depth

Options:

A.

The company relies solely on a firewall to block unauthorized access


B.

The company stores all sensitive data on a single server


C.

The hacker is required to enter a username and password


D.

None


Expert Solution
Questions # 30:

A/hich layer of the OSI Layer model is the target of a buffer overflow attack

Options:

A.

Layer 7


B.

Layer 3


C.

Layer 5


D.

Layer 4


Expert Solution
Viewing page 3 out of 13 pages
Viewing questions 21-30 out of questions