Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions
Questions # 31:

You experienced a power outage that disrupted access to your data center. What type of security concern occurred?

Options:

A.

Availability


B.

Confidentiality


C.

Non-repudiation


D.

Integrity


Expert Solution
Questions # 32:

Which IR phase involves identifying critical data and systems?

Options:

A.

Detection and analysis


B.

Preparation


C.

Containment


D.

Eradication


Expert Solution
Questions # 33:

Which concept prevents crime by designing a physical environment that positively influences human behavior?

Options:

A.

DMZ


B.

Security alarm


C.

CPTED


D.

CCTV


Expert Solution
Questions # 34:

Running simulated instances of a computer system abstracted from underlying hardware is called:

Options:

A.

Containerization


B.

Simulation


C.

Emulation


D.

Virtualization


Expert Solution
Questions # 35:

An unknown person obtains unauthorized access to the company file system. This is an example of:

Options:

A.

Intrusion


B.

Breach


C.

Exploit


D.

Incident


Expert Solution
Questions # 36:

The right of an individual to control the distribution of information about themselves is:

Options:

A.

Confidentiality


B.

Integrity


C.

Privacy


D.

Availability


Expert Solution
Questions # 37:

COVID-19 is an example where which plan sustains business?

Options:

A.

IRP


B.

DRP


C.

BCP


D.

All


Expert Solution
Questions # 38:

What is the highest priority during incident response?

Options:

A.

Protect mission


B.

Reduce impact


C.

Protect life, health, and safety


D.

Resume operations


Expert Solution
Questions # 39:

Which of the following is NOT an element of system security configuration management?

Options:

A.

Baselines


B.

Updates


C.

Inventory


D.

Audit logs


Expert Solution
Questions # 40:

A structured approach used to oversee and manage risk for an enterprise is called:

Options:

A.

Risk assessment


B.

Risk threshold


C.

Risk Management Framework


D.

Risk appetite


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions