Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 6 out of 13 pages
Viewing questions 51-60 out of questions
Questions # 51:

What is the primary factor in the reliability of information and system

Options:

A.

Authenticity


B.

Confidentiality


C.

Integrity


D.

Availability


Expert Solution
Questions # 52:

What is a threat in the context of cybersecurity

Options:

A.

An inherent weakness or flaw in a system


B.

Something in need of protection


C.

The means by which a threat actor carries out their objectives


D.

A person or thing that takes action to exploit a target organizations system vulnerabilities


Expert Solution
Questions # 53:

DDOS attack affect which OSI layer

Options:

A.

Network layer


B.

Transport layer


C.

Physical Layer


D.

Both A and B


Expert Solution
Questions # 54:

TCP and UDP reside at which layer of the osi model?

Options:

A.

Session


B.

Transport


C.

Data link


D.

Presentation


Expert Solution
Questions # 55:

Who should participate in creating a BCP

Options:

A.

Only members from the IT department


B.

Only members from the management team


C.

Members from across the organization


D.

Only members from the finanace department


Expert Solution
Questions # 56:

Which access control model is best suited for a large organization with many departments that have different data access needs

Options:

A.

DAC


B.

RBAC


C.

MAC


D.

RUBAC


Expert Solution
Questions # 57:

What is sensitivity in the context of confidentiality

Options:

A.

The harm caused to externl stakeholders if information is disclosed or modified


B.

The ability of information to be accessed only by authorized individuals


C.

The need for protection assigned to information by its owner


D.

The Health status of the individuals


Expert Solution
Questions # 58:

What is the first phase in System Development Life Cycle

Options:

A.

Requirements Analysis Phase


B.

Feasibilty Study


C.

Design Phase


D.

Development Phase


Expert Solution
Questions # 59:

Finance Server and Transactions Server has restored its original facility after a disaster, what should be moved in FIRST?

Options:

A.

Management


B.

Most critical systems


C.

Most critical functions


D.

Least critical functions


Expert Solution
Questions # 60:

Which of the following types of vulnerabilities cannot be discovered in the course of a routine vulnerability assessment?

Options:

A.

Zero-day vulnerability


B.

Kernel flaw


C.

Buffer overflow


D.

File and directory permissions


Expert Solution
Viewing page 6 out of 13 pages
Viewing questions 51-60 out of questions