Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 5 out of 13 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following protocols is a secure alternative to using telnet?

Options:

A.

SSH


B.

HTTPS


C.

SFTP


D.

LDAPS


Expert Solution
Questions # 42:

What is the end goal of DRP

Options:

A.

All System backup restored


B.

DR site activated


C.

Shifting the Infrastructure to new place


D.

Business restored to full last-known reliable operations.


Expert Solution
Questions # 43:

A Company IT system experienced a system crash that result in a loss of data. What term best describes this event?

Options:

A.

Breach


B.

Incident


C.

Event


D.

Adverse Event


Expert Solution
Questions # 44:

Is defined as the process of identifying, estimating and prioritizing risks

Options:

A.

Risk Assessment


B.

Risk Treatment


C.

Risk mitigation


D.

Risk Management


Expert Solution
Questions # 45:

Which access control model grants permission based on the sensitivity of the data and the user job functions

Options:

A.

DAC


B.

RBAC


C.

MAC


D.

RUBAC


Expert Solution
Questions # 46:

What is privacy in the context of Information Security?

Options:

A.

Protecting data from unauthorized access


B.

Ensuring data is accurate and unchanged


C.

Making sure data is always accessible when needed.


D.

Disclosed without their consent


Expert Solution
Questions # 47:

Which is related to Privacy

Options:

A.

GDPR


B.

FIPS


C.

MOU


D.

AII


Expert Solution
Questions # 48:

In the context of cybersecurity, typical threat actors include the following:

Options:

A.

Insiders (either deliberately, by simple human error, or by gross incompetence).


B.

Outside individuals or informal groups (either planned or opportunistic, discovering vulnerability).


C.

Technology (such as free-running bots and artificial intelligence


D.

All


Expert Solution
Questions # 49:

Centralized organizational function fulfilled by an information security team that monitors, detects and analyzes events on the network or system to prevent and resolve issues before they result in business disruptions.

Options:

A.

IRP


B.

BCP


C.

SOC


D.

DRP


Expert Solution
Questions # 50:

What is the difference between hub and switch

Options:

A.

A hub is less likely to be used in home network


B.

A hub can create separate broad cast domains when used to create Vlan


C.

A hub retransmits traffic to all devices, while a switch route traffic to a specific devices


D.

A switch retransmits traffic to all devices, while a hub route traffic to a specific devices


Expert Solution
Viewing page 5 out of 13 pages
Viewing questions 41-50 out of questions