Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions
Questions # 81:

Example of dynamic authorization:

Options:

A.

DAC


B.

RBAC


C.

MAC


D.

ABAC


Expert Solution
Questions # 82:

What is the difference between Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)?

Options:

A.

BCP restores IT systems, DRP maintains business functions


B.

DRP restores IT and communications, BCP maintains critical business functions


C.

They are the same


D.

BCP only applies before disasters


Expert Solution
Questions # 83:

What is the primary goal of incident management?

Options:

A.

To protect life, health, and safety


B.

To reduce the impact of an incident


C.

To prepare for any incident


D.

To resume interrupted operations as soon as possible


Expert Solution
Questions # 84:

The primary functionality of Privileged Access Management (PAM) is:

Options:

A.

Validate access to a file


B.

Prevent unauthorized access to assets


C.

Provide just-in-time access to critical resources


D.

Manage centralized access control


Expert Solution
Questions # 85:

A system architecture where one instance serves multiple user groups:

Options:

A.

Multithreading


B.

Multiprocessing


C.

Multitenancy


D.

Multi-cloud


Expert Solution
Questions # 86:

John is concerned about a possible conflict of interest from a consulting side job. Which source should he consult?

Options:

A.

ISC2 Code of Ethics


B.

Organizational Code of Ethics


C.

Country Code of Ethics


D.

Organizational Security Policy


Expert Solution
Questions # 87:

What is the first component the new security engineer should learn about in the incident response plan?

Options:

A.

Detection and analysis


B.

Preparation


C.

Containment


D.

Eradication


Expert Solution
Questions # 88:

Information should be consistently and readily accessible for authorized parties.

Options:

A.

Confidentiality


B.

Authentication


C.

Availability


D.

Non-repudiation


Expert Solution
Questions # 89:

Which attack attempts to gain information by observing a device’s power consumption?

Options:

A.

DoS


B.

Side-channel attack


C.

XSS


D.

CSRF


Expert Solution
Questions # 90:

Which of the following is NOT one of the three main components of an SQL database?

Options:

A.

Views


B.

Schemas


C.

Tables


D.

Object-oriented interfaces


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions