Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 4 out of 13 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following is not an element of system security configuration management

Options:

A.

Baselines


B.

Updates


C.

Inventory


D.

Audit logs


Expert Solution
Questions # 32:

What is the BEST defense against dumpster diving attacks?

Options:

A.

Anti-malware software


B.

Clean desk policy


C.

Data loss prevention tools


D.

Shredding


Expert Solution
Questions # 33:

What is the primary goal of implementing input validation in application security?

Options:

A.

To ensure all inputs are stored in a secure database


B.

To prevent unauthorized access to the application


C.

To validate and sanitize user inputs to prevent code injection attacks (Correct)


D.

To encrypt sensitive data transmitted between the client and server


Expert Solution
Questions # 34:

An unknown person obtaining access to the company file system without authorization is example of

Options:

A.

Intrusion


B.

Breach


C.

Exploit


D.

Incident


Expert Solution
Questions # 35:

A company wants to ensure that its employees can evacuate the building in case of an emergency which physical control is best suited for this scenario

Options:

A.

Fire Alarms


B.

Exit signs


C.

Emergency lighting


D.

Emergency exit doors


Expert Solution
Questions # 36:

Is a way to prevent unwanted devices from connecting to a network.

Options:

A.

DMZ


B.

VPN


C.

VLAN


D.

NAC


Expert Solution
Questions # 37:

A company performs an analysis of its information systems requirements functions and interdependences in order to prioritize contingency requirement. What is this process called?

Options:

A.

BCP


B.

DRP


C.

IRP


D.

BIA


Expert Solution
Questions # 38:

Which type of control is used to restore systems or processes to their normal state after an attack has occurred

Options:

A.

Compensatory Control


B.

Recovery Control


C.

Detective Control


D.

Corrective Control


Expert Solution
Questions # 39:

Devid is worried about distributed denial of service attacks against his company's primary web application, which of the following options will provide the MOST resilience against large-scale ddos attacks?

Options:

A.

Implement a CDN


B.

Increase the number of servers in the web application server cluster


C.

Contract for DDoS mitigation services via the company's IPS


D.

Increase the amount of bandwidth available from one or more ISPs


Expert Solution
Questions # 40:

Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model.

Options:

A.

Segment


B.

Packet


C.

Frame


D.

None of the Above


Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 31-40 out of questions