Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of these components is very likely to be instrumental to any disaster recovery (DR) effort?

Options:

A.

Routers


B.

Laptops


C.

Firewalls


D.

Backups


Expert Solution
Questions # 42:

The evaluation of security controls to determine whether they are implemented correctly and operating as intended is known as:

Options:

A.

Security assessment


B.

Risk assessment


C.

DRP


D.

IRP


Expert Solution
Questions # 43:

What is the focus of disaster recovery planning after a data center outage?

Options:

A.

Maintaining business functions


B.

Fixing hardware


C.

Restoring IT and communications


D.

Emergency response guidance


Expert Solution
Questions # 44:

What kind of control is it when we add a backup firewall that takes over if the main one stops working?

Options:

A.

Clustering


B.

High availability (HA)


C.

Load balancing


D.

Component redundancy


Expert Solution
Questions # 45:

A set of security controls or system settings used to ensure uniformity of configuration through the IT environment?

Options:

A.

Patches


B.

Inventory


C.

Baseline


D.

Policy


Expert Solution
Questions # 46:

A newly enforced BYOD policy represents which control type?

Options:

A.

Physical control


B.

Logical control


C.

Administrative control


D.

Technical control


Expert Solution
Questions # 47:

According to ISC2 Code of Ethics, to whom does Kristal ultimately report?

Options:

A.

The company


B.

Governments


C.

ISC2


D.

The users


Expert Solution
Questions # 48:

Communication between end systems is encrypted using a key, often known as ________?

Options:

A.

Temporary key


B.

Section key


C.

Public key


D.

Session key


Expert Solution
Questions # 49:

What is the focus of disaster recovery planning after a data center failure?

Options:

A.

Maintain business functions


B.

Fix hardware


C.

Restore IT and communications


D.

Guide emergency responders


Expert Solution
Questions # 50:

Which scenario best represents defense in depth?

Options:

A.

Relying only on a firewall


B.

Storing all data on one server


C.

Requiring only a username and password


D.

None


Expert Solution
Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions