Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 7 out of 13 pages
Viewing questions 61-70 out of questions
Questions # 61:

Exhibit.

Question # 61

Question # 61

What kind of vulnerability is typically not identifiable through a standard vulnerability assessment?

Options:

A.

File permissions


B.

Buffer overflow


C.

Zero-day vulnerability


D.

Cross-site scripting


Expert Solution
Questions # 62:

Which one of the following cryptographic algorithms does not depend upon the prime factorization problem?

Options:

A.

RSA - Rivest-Shamir-Adleman


B.

GPG - GNU Privacy Guard


C.

ECC - Elliptic curve cryptosystem


D.

PGP - Pretty Good Privacy


Expert Solution
Questions # 63:

Which layer of OSI the Firewall works

Options:

A.

Layer 3


B.

Layer 4


C.

Layer 7


D.

AII


Expert Solution
Questions # 64:

4 Embedded systems and network-enabled devices that communicate with the internet are considered as

Options:

A.

Endpoint


B.

Node


C.

IOT


D.

router


Expert Solution
Questions # 65:

The means by which a threat actor carries out their objectives

Options:

A.

Threat


B.

Threat Vector


C.

Exploit


D.

Intrusion


Expert Solution
Questions # 66:

Which of these activities is often associated with DR efforts?

Options:

A.

Running anti-malware solutions


B.

Scanning the IT environment for vulnerabilities


C.

Zero-day exploits


D.

Employees returning to the primary production location


Expert Solution
Questions # 67:

Which is the component of a Business Continuity (BC) plan

Options:

A.

Immediate response procedures and checklists


B.

Notification systems and call trees for alerting personnel


C.

Guidance for management, including designation of authority for specific managers


D.

ALL


Expert Solution
Questions # 68:

A standard that defines wired communications of network devices

Options:

A.

Switch


B.

Hub


C.

router


D.

Ethernet


Expert Solution
Questions # 69:

A collection of actions that must be followed in order to complete a task or process in accordance with a set of rules

Options:

A.

Policy


B.

Procedure


C.

Law


D.

Standard


Expert Solution
Questions # 70:

EKristal is the security administrator for a large online service provider. Kristal learns that the company is harvesting personal data of its customers and sharing the data with local governments where the company operates, without the knowledge of the users, to allow the governments to persecute users on the basis of their political and philosophical beliefs. The published user agreement states that the company will not share personal user data with any entities without the users' explicit permission. According to the ISC2 Code of Ethics, to whom does Kristal ultimately report in this situation?

Options:

A.

The company Kristal works for


B.

The governments of the countries where the company operates


C.

ISC2


D.

The users


Expert Solution
Viewing page 7 out of 13 pages
Viewing questions 61-70 out of questions