Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions
Questions # 71:

Part of a zero-trust strategy that breaks LANs into very small and highly localized zones using firewalls.

Options:

A.

Zero Trust


B.

DMZ


C.

VPN


D.

Micro Segmentation


Expert Solution
Questions # 72:

Which of these is an example of deterrent control

Options:

A.

Biometric


B.

Guard Dog


C.

Encryption


D.

Trunstile


Expert Solution
Questions # 73:

Which TLS extension is used to optimize the TLS handshake process by reducing the number of round trips between the client and server?

Options:

A.

TLS Renegotiation


B.

TLS Heartbeat


C.

TLS Session Resumption


D.

TLS FastTrack


Expert Solution
Questions # 74:

Which type of attack will most effectively maintain remote access and control over the victims computer

Options:

A.

Phising


B.

Trojans


C.

XSS


D.

RootKits


Expert Solution
Questions # 75:

What is the difference between BCP and DRP

Options:

A.

BCP is about restoring IT and communications back to full operations after a disruption, while DRP is about maintaining critical business functions


B.

DRP is about restoring IT and communications back to full operations after a disruption, while BCP i about maintaining critical business functions


C.

DRP and BCP are the same


D.

BCP is about maintaining critical business functions before a disaster occurs


Expert Solution
Questions # 76:

Which of the following security controls is designed to prevent unauthorized access to sensitive information by ensuring that it is only accessible to authorized users?

Options:

A.

Encryption


B.

Firewall


C.

Antivirus


D.

Access control


Expert Solution
Questions # 77:

A company primary data center goes down due to a hardware failure causing a major disruption to the IT and communications systems. What is the focus of disaster recovery planning in this scenario

Options:

A.

Maintaining critical business functions during the disruption


B.

Fixing the hardware failure


C.

Restoring IT and communications back to full operations after the disruptions


D.

Guiding the actions of emergency response personnel during the disruption


Expert Solution
Questions # 78:

Events with a negative consequence, such as system crashes, network packet floods, unauthorized use of system privileges, defacement of a web page or execution of malicious code that destroys data.

Options:

A.

Breach


B.

Incident


C.

Adverse Event


D.

Exploit


Expert Solution
Questions # 79:

Which of these components is very likely to be instrumental to any disaster recovery (DR) effort?

Options:

A.

Routers


B.

Laptops


C.

Firewalls


D.

Backups


Expert Solution
Questions # 80:

A chief information security officer (CISO) at a large organization documented a policy that establishes the acceptable use of cloud environments for all staff. This is an example of

Options:

A.

Technical control


B.

Physical control


C.

Cloud control


D.

Management/Administrative control


Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions