Pass the ISC ISC certification CC Questions and answers with CertsForce

Viewing page 9 out of 13 pages
Viewing questions 81-90 out of questions
Questions # 81:

What should been done to limit the damage caused by the ransomware attack

Options:

A.

Use a different email client to prevent malicious attachments


B.

Add more Administrative users to the Domain Admins group


C.

Delete all emails with attachments


D.

Limit the use of administrative privileges to only when required


Expert Solution
Questions # 82:

Which is the first step in the risk management process

Options:

A.

Risk response


B.

Risk mitigation


C.

Risk identification


D.

Risk assessment


Expert Solution
Questions # 83:

Set of rules that everyone must comply with and usually carry monetary penalties for noncompliance

Options:

A.

Standard


B.

Policy


C.

Procedure


D.

Laws or Regulations


Expert Solution
Questions # 84:

Which of the following is a type of risk that involves the unauthorized use or disclosure of confidential information such as passwords, financial data or personal information?

Options:

A.

Compliance risk


B.

Reputatuinal risk


C.

Operational risk


D.

Information risk


Expert Solution
Questions # 85:

Restoring IT and communications back to full operation after a disruption.

Options:

A.

BCP


B.

IRP


C.

DRP


D.

None


Expert Solution
Questions # 86:

Granting a user access to services or the system

Options:

A.

Authentication


B.

Identification


C.

Authorization


D.

Confidentiality


Expert Solution
Questions # 87:

Faking the sender address in a transmission to gain illegal entry into a secure system

Options:

A.

Phishing


B.

ARP


C.

Spoofing


D.

ALL


Expert Solution
Questions # 88:

In which cloud model does the cloud customer have less responsibility over the infrastructure

Options:

A.

FaaS


B.

SaaS


C.

laaS


D.

PaaS


Expert Solution
Questions # 89:

Who should participate in creation a business continuity plan

Options:

A.

Onlymembersfrom the management team


B.

only members from the IT department


C.

Onlymembersfrom thefinancedepartment


D.

Members from across the organization


Expert Solution
Questions # 90:

Which maintains that a user or entity should only have access to the spec data, resources and applications needed to complete a required task.

Options:

A.

Zero Trust


B.

Defence in Depth


C.

Least Privileges


D.

AII


Expert Solution
Viewing page 9 out of 13 pages
Viewing questions 81-90 out of questions