Pre-Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

CC Sample Questions Answers

Questions 4

Which type of malware encrypts a users file system and demands payment in exchange of decrypting key

Options:

A.

Worm

B.

Trojan

C.

virus

D.

Ransomware

Buy Now
Questions 5

A backup is which type for security control

Options:

A.

Preventive

B.

Deterrent

C.

Recovery

D.

Corrective

Buy Now
Questions 6

Events with a negative consequence, such as system crashes, network packet floods, unauthorized use of system privileges, defacement of a web page or execution of malicious code that destroys data.

Options:

A.

Breach

B.

Incident

C.

Adverse Event

D.

Exploit

Buy Now
Questions 7

Which one of the following cryptographic algorithms does not depend upon the prime factorization problem?

Options:

A.

RSA - Rivest-Shamir-Adleman

B.

GPG - GNU Privacy Guard

C.

ECC - Elliptic curve cryptosystem

D.

PGP - Pretty Good Privacy

Buy Now
Questions 8

provide integrity services that allow a recipient to verify that a message has not been altered.

Options:

A.

Hashing

B.

encryption

C.

decryption

D.

encoding

Buy Now
Questions 9

The practice of ensuring that an organizational process cannot be completed by a single person; forces collusion as a means to reduce insider threats.

Options:

A.

Segregation of Duties

B.

Principle of Least Privilege

C.

Privileged Account

D.

Rule-based access control

Buy Now
Questions 10

Which of the following physical controls is used to protect against eavesdropping and data theft through electromagnetic radiation

Options:

A.

EMI Shielding

B.

Screening rooms

C.

White noise generators

D.

ALL

Buy Now
Questions 11

Removing the design belief that the network has any trusted space. Security is managed at eachpossible level, representing the most granular asset. Micro segmentation of workloads is a tool of the model.

Options:

A.

Zero Trust

B.

DMZ

C.

VLAN

D.

Micro Segmentation

Buy Now
Questions 12

What is the main purpose of using digital signatures in communication security?

Options:

A.

To encrypt sensitive data during transmission

B.

To verify the identity of the sender and ensure the integrity of the message (Correct)

C.

To prevent unauthorized access to a network

D.

To compress data to reduce bandwidth usage

Buy Now
Questions 13

Uses multiple types of access controls in literal or theoretical

layers to help an organization avoid a monolithic security

Options:

A.

DMZ

B.

VLAN

C.

Defence in Depth

D.

VPN

Buy Now
Questions 14

The amount of risk, at a broad level, that an organization is

willing to accept in pursuit of its strategic objectives.

Options:

A.

Risk Assessment

B.

Risk Transfer

C.

Risk Appetite

D.

Risk Management

Buy Now
Questions 15

Which is related to Privacy

Options:

A.

GDPR

B.

FIPS

C.

MOU

D.

AII

Buy Now
Questions 16

What is the difference between BCP and DRP

Options:

A.

BCP is about restoring IT and communications back to full operations after a disruption, while DRP is about maintaining critical business functions

B.

DRP is about restoring IT and communications back to full operations after a disruption, while BCP i about maintaining critical business functions

C.

DRP and BCP are the same

D.

BCP is about maintaining critical business functions before a disaster occurs

Buy Now
Questions 17

Which access control model can grant access to a given object based on complex rules

Options:

A.

ABAC

B.

DAC

C.

MAC

D.

RBAC

Buy Now
Questions 18

What is the first step in incident response planning

Options:

A.

Develop a policy approved by management

B.

Identify critical data and systems

C.

Train staff on incident response

D.

implement an incident response team

Buy Now
Questions 19

What is the best practise to clear SSD storage after usage in term of cyber security

Options:

A.

Zero fill

B.

Degaussing

C.

Clearing

D.

Disintegration

Buy Now
Questions 20

A logical group of workstations, servers and network devices that appear to be on the same LAN despite their geographical distribution.

Options:

A.

LAN

B.

VPN

C.

WLAN

D.

VLAN

Buy Now
Questions 21

Which type of fire suppression system is more friendly to electronics

Options:

A.

Carbon di Oxide based

B.

Chemical based

C.

Water based

D.

Foam based

Buy Now
Questions 22

DevOps team has updated the application source code, Tom has discovered that many unauthorized changes have been made. What is the BEST control Tom can implement to prevent a recurrence of this problem?

Options:

A.

Backup

B.

File labels

C.

Security audit

D.

Hashing

Buy Now
Questions 23

A one-way spinning door or barrier that allows only one person at a time to enter a building or pass through an area.

Options:

A.

Turnstile

B.

ManTrap

C.

Bollard

D.

Gate

Buy Now
Questions 24

Timiting access to resources based on the sensitivity of the information that the resource contains and the authorization of the user to access information with that level of sensitivity.

Options:

A.

DAC

B.

MAC

C.

RuBAC

D.

RBAC

Buy Now
Questions 25

What is the purpose of immediate response procedures and checklists in a BCP

Options:

A.

To notify personnel that the BCP is being enacted

B.

To provide guidance for management

C.

To safeguard the confidentiality, integrity and availability of information

D.

To ensure business operations are accounted for in the plan

Buy Now
Questions 26

What is the difference between business continuity planning and disaster recovery planning?

Options:

A.

Business continuity planning is abount restoring IT and communincations back to full operations after a dustruption, while disaster recovery planning is about maintaining criticla business functions

B.

Disaster recovery planning is about restoring IT and communications back to full operations after a disruption, while business continuity planning is about maintaining critical business functions

C.

Business continuity planning and disaster recovery planning are the same thisg

D.

Business continuity planning is about maintainig criticla business funtions before disasteroccurs

Buy Now
Questions 27

Devid is worried about distributed denial of service attacks against his company's primary web application, which of the following options will provide the MOST resilience against large-scale ddos attacks?

Options:

A.

Implement a CDN

B.

Increase the number of servers in the web application server cluster

C.

Contract for DDoS mitigation services via the company's IPS

D.

Increase the amount of bandwidth available from one or more ISPs

Buy Now
Questions 28

A company's governing board may agree that legal services will examine any third-party contracts, so they create a________stating that aside from legal services, no other department in the companvhahppn pivpn nprmkcinn to review third-party contracts

Options:

A.

Procedure

B.

Policy

C.

Standard

D.

Law

Buy Now
Questions 29

An agreement between a cloud service provider and a cloud service customer based on a taxonomy of cloud computing- specific terms

Options:

A.

Memorandum of Understanding

B.

Memorandam on Agreement

C.

SLA

D.

AII

Buy Now
Questions 30

255.255.255.0 Address represents

Options:

A.

Broadcast

B.

Unicast

C.

Subnet mask

D.

Global Address

Buy Now
Questions 31

Organization experiences a security event that does not affect the confidentiality integrity and availability of its information system. What term BEST describes this situation?

Options:

A.

Exploit

B.

Breach

C.

Incident

D.

Event

Buy Now
Questions 32

DDOS attack affect which OSI layer

Options:

A.

Network layer

B.

Transport layer

C.

Physical Layer

D.

Both A and B

Buy Now
Questions 33

Mark has purchased a MAC LAPTOP. He is scared of losing his screen and planning to buy an insurance policy. So, which risk management strategy is?

Options:

A.

Risk acceptance

B.

Risk deterrence

C.

Risk transference

D.

Risk mitigation

Buy Now
Questions 34

Which authentication helps build relationships between different technology providers, enabling automatic identification and user access. Employees no longer need to enter separate usernames and passwords when visiting a new service provider

Options:

A.

Basic

B.

Kerberos

C.

Token Based

D.

Federated

Buy Now
Questions 35

Faking the sending address of a transmission to gain illegal entry into a secure system.

Options:

A.

Phishing

B.

ARP

C.

Spoofing

D.

ALL

Buy Now
Questions 36

What is the primary goal of Identity and Access Management (1AM) in cybersecurity?

Options:

A.

To ensure 100% security against all threats

B.

To provide secure and controlled access to resources

C.

To eliminate the need for user authentication

D.

To monitor network traffic for performance optimization

Buy Now
Questions 37

What cybersecurity principle focuses on granting users only the privileges necessary to perform their job functions?

Options:

A.

Least privilege (Correct)

B.

defense in depth

C.

separation of duties

D.

need-to-know basis

Buy Now
Questions 38

A cyber security professional observes an unusual occurrence in the network or system. What term best describes this situations

Options:

A.

Breach

B.

Exploit

C.

Event

D.

Intrusion

Buy Now
Questions 39

The prevention of authorized access to resources or the delaying of time critical operations.

Options:

A.

ARP Poisoning

B.

Syn Flood

C.

Denial-of-Service (DoS)

D.

AII

Buy Now
Questions 40

An unknown person obtaining access to the company file system without authorization is example of

Options:

A.

Intrusion

B.

Breach

C.

Exploit

D.

Incident

Buy Now
Questions 41

Which is an authorized simulated attack performed on a computer system to evaluate its security.

Options:

A.

Penetration test

B.

Security Testing

C.

Automated Testing

D.

Regression Testing

Buy Now
Questions 42

The testing or evaluation of security controls to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for an information system or organization.

Options:

A.

Security Assessment

B.

Risk Assessment

C.

DRP

D.

IRP

Buy Now
Questions 43

A chief information security officer (CISO) at a large organization documented a policy that establishes the acceptable use of cloud environments for all staff. This is an example of

Options:

A.

Technical control

B.

Physical control

C.

Cloud control

D.

Management/Administrative control

Buy Now
Questions 44

John joined the ISC2 Organizations, his manager asked to check the authentications in security module. What would John use to ensure a certain control is working as he want and expect it to?

Options:

A.

Security Testing

B.

Security assessment

C.

Security audit

D.

Security walkthrough

Buy Now
Questions 45

While taking the certification exam for ISC2 CC, You notice another candidate for the certification cheating. What should you do?

Options:

A.

Yell at the other candidate for violating test security.

B.

Nothing—each person is responsible for their own actions.

C.

Report the candidate to ISC2.

D.

Call local law enforcement.

Buy Now
Questions 46

Is defined as the process of identifying, estimating and prioritizing risks

Options:

A.

Risk Assessment

B.

Risk Treatment

C.

Risk mitigation

D.

Risk Management

Buy Now
Questions 47

A set of instructions to help IT staff detect, respond to, and recover from network security incidents?

Options:

A.

BCP

B.

IRP

C.

DRP

D.

None

Buy Now
Questions 48

Centralized organizational function fulfilled by an information security team that monitors, detects and analyzes events on the network or system to prevent and resolve issues before they result in business disruptions.

Options:

A.

IRP

B.

BCP

C.

SOC

D.

DRP

Buy Now
Questions 49

A company experiences a power outage that causes a major disruption in its operations. What type of plan will help the company sustain operations?

Options:

A.

DRP

B.

IRP

C.

BCP

D.

ALL

Buy Now
Questions 50

Sending employees to work at a customer's home can open your business to more risk of bodily injury or property damage claims. So, to reduce risk and avoid potential losses, you decide not to offer those kinds of services

Options:

A.

Risk Acceptance

B.

Risk Assessment

C.

Risk Avoidance

D.

Risk Control

Buy Now
Questions 51

Example of Technical controls

Options:

A.

Security Guard

B.

GPS installed in vehicle to track location

C.

Door Lock

D.

None

Buy Now
Questions 52

Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information

Options:

A.

Risk Management

B.

Risk Assessment

C.

Risk Mitigation

D.

Adequate Security

Buy Now
Questions 53

Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?

Options:

A.

Non-repudiation

B.

Integrity

C.

Availability

D.

Confidentiality

Buy Now
Questions 54

What is the primary goal of a risk management process in cybersecurity?

Options:

A.

to eliminate all cybersecurity risks

B.

to transfer all cybersecurity risks to a third party

C.

to identify, assess, and mitigate cybersecurity risks to an acceptable level (Correct)

D.

to ignore cybersecurity risks and focus on incident response

Buy Now
Questions 55

An analysis of an information system's requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption.

Options:

A.

BIA

B.

DR

C.

BCP

D.

IRP

Buy Now
Questions 56

Which phase of the access control process(AAA) does a user prove his/her identity?

Options:

A.

Authentication

B.

Authorization

C.

Identification

D.

Accounting

Buy Now
Questions 57

Devid's team recently implemented a new system that gathers information from a variety of different log sources, analyses that information, and then triggers automated playbooks in response to security events, what term BEST describes this technology?

Options:

A.

SIEM

B.

Log Repository

C.

IPS

D.

SOAR

Buy Now
Questions 58

What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?

Options:

A.

Least privilege

B.

Two person control

C.

Job rotation

D.

Separation of privileges

Buy Now
Questions 59

A hacker gains access to an organization system without authorization and steal confidential data. What term best describes this ?

Options:

A.

Event

B.

Breach

C.

Intrusion

D.

Exploit

Buy Now
Questions 60

Which type of attack will most effectively maintain remote access and control over the victims computer

Options:

A.

Phising

B.

Trojans

C.

XSS

D.

RootKits

Buy Now
Questions 61

A_________is a distributed denial-of-service (DDoS) attack in which an attacker attempts to flood a targeted server with Internet Control Message Protocol (ICMP) packets.

Options:

A.

DOS

B.

Syn flood

C.

Smurf attack

D.

Phishing attack

Buy Now
Questions 62

Which of the following types of vulnerabilities cannot be discovered in the course of a routine vulnerability assessment?

Options:

A.

Zero-day vulnerability

B.

Kernel flaw

C.

Buffer overflow

D.

File and directory permissions

Buy Now
Questions 63

Is a way to prevent unwanted devices from connecting to a network.

Options:

A.

DMZ

B.

VPN

C.

VLAN

D.

NAC

Buy Now
Questions 64

allows for extremely granular restrictions within the IT environment, to the

point where rules can be applied to individual machines and/or users,

Options:

A.

DMZ

B.

Microsegmentation

C.

VLAN

D.

NAC

Buy Now
Questions 65

A collection of actions that must be followed in order to complete a task or process in accordance with a set of rules

Options:

A.

Policy

B.

Procedure

C.

Law

D.

Standard

Buy Now
Questions 66

A large organization is planning to create a DRP. Which of the following is the BEST document to provide a high-level overview of the plan?

Options:

A.

Technical guides for IT personnel

B.

Department specific plans

C.

Full copies of the plan for critical disaster recovery team members

D.

Execute summary

Buy Now
Questions 67

The internet standards organization, made up of network designers, operators, vendors and researchers, that defines protocol standards

Options:

A.

ISO

B.

NIST

C.

IETF

D.

GDPR

Buy Now
Questions 68

4 Embedded systems and network-enabled devices that communicate with the internet are considered as

Options:

A.

Endpoint

B.

Node

C.

IOT

D.

router

Buy Now
Questions 69

What is the benefit of subnet

Options:

A.

By increasing network bandwidth

B.

By improving network security

C.

By reducing network congestion

D.

By simplifying network management

Buy Now
Questions 70

A company network experience a sudden flood of network packets that causes major slowdown in internet traffic. What type of event it this?

Options:

A.

Security incident

B.

Natural disaster

C.

Exploit

D.

Adverse event

Buy Now
Questions 71

Mark works in the security office. During research, Mark learns that a configuration change could better protect the organization's IT environment. Mark makes a proposal for this change, but the change cannot be implemented until it is approved, tested, and then cleared for deployment by the Change Control Board. This is an example of__________

Options:

A.

Holistic security

B.

Defense in depth

C.

Threat intelligence

D.

Segregation of duties

Buy Now
Questions 72

The Order of controls used in Defence in Depth

Options:

A.

Assests, Physical controls. Administrative Controls, Logical/Techincal Controls

B.

Assests, Administrative Controls, Physical controls, Logical/Techincal Controls

C.

Physical controls. Administrative Controls, Logical/Techincal Controls, Assests

D.

Assests, Administrative Controls, Logical/Techincal Controls, Physical controls

Buy Now
Questions 73

Ignoring the risk and proceeding the business operations

Options:

A.

Risk Acceptance

B.

Risk Mitigation

C.

Risk Avoidance

D.

Risk Transfer

Buy Now
Questions 74

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which one of the following controls would BEST achieve his objective?

Options:

A.

URL Filter

B.

IP Address Block

C.

DLP Solution

D.

IPS Solution

Buy Now
Questions 75

Common network device used to connect networks?

Options:

A.

Server

B.

Endpoint

C.

Router

D.

Switch

Buy Now
Questions 76

Which access control model is best suited for a large organization with many departments that have different data access needs

Options:

A.

DAC

B.

RBAC

C.

MAC

D.

RUBAC

Buy Now
Questions 77

What is a type of system architecture where a single instance can serve multiple distinct user groups.

Options:

A.

Mutli-threading

B.

Multi-processing

C.

Multitenancy

D.

Multi-cloud

Buy Now
Questions 78

The process of how an organization is managed; usually includes all aspects of how decisions are made for that organization

Options:

A.

Standard

B.

Policy

C.

Procedure

D.

Governance

Buy Now
Questions 79

Which type of encryption uses only one shared key to encrypt and decrypt?

Options:

A.

Public key

B.

Asymmetric

C.

Symmetric

D.

TCB key

Buy Now
Questions 80

Walmart has large ecommerce presence in world. Which of these solutions would ensure the LOWEST possible latency for their customers using their services?

Options:

A.

CDN

B.

SaaS

C.

Load Balancing

D.

Decentralized Data Centers

Buy Now
Questions 81

What federal law requires the use of vulnerability scanning on information systems operated by federal government agencies?

Options:

A.

FISMA

B.

HIPAA

C.

GLBA

D.

FERPA

Buy Now
Questions 82

Which of the following documents identifies the principles and rules governing an organization's protection of information systems and data

Options:

A.

Procudure

B.

Guideline

C.

Policy

D.

Standard

Buy Now
Questions 83

An employee unintentionally shares confidential information with an unauthorized party. What term best describes this situation?

Options:

A.

Event

B.

Exploit

C.

Intrusion

D.

Breach

Buy Now
Questions 84

A company primary data center goes down due to a hardware failure causing a major disruption to the IT and communications systems. What is the focus of disaster recovery planning in this scenario

Options:

A.

Maintaining critical business functions during the disruption

B.

Fixing the hardware failure

C.

Restoring IT and communication system back to full operations after the disruptions.

D.

Guiding the actions of emergency response personnel during the disruption

Buy Now
Questions 85

Which type of control is used to restore systems or processes to their normal state after an attack has occurred

Options:

A.

Compensatory Control

B.

Recovery Control

C.

Detective Control

D.

Corrective Control

Buy Now
Questions 86

Which of the following is a characteristic of cloud

Options:

A.

Broad Network Access

B.

Rapid Elasticity

C.

Measured Service

D.

AII

Buy Now
Questions 87

Which OSI layer VPN works

Options:

A.

Layer 5

B.

Layer 6

C.

Layer 1

D.

Layer 3

Buy Now
Questions 88

Which of the following is endpint

Options:

A.

Router

B.

Firewall

C.

Laptop

D.

Switch

Buy Now
Questions 89

A________creates an encrypted tunnel to protect your personal data and communications

Options:

A.

HTTPS

B.

VPN

C.

Anti-virus

D.

IDS

Buy Now
Questions 90

Configuration settings or parameters stored as data, managed through a software graphical user interface (GUI) is

Options:

A.

Logical access control

B.

Physical access control

C.

Administratirve Access control

Buy Now
Questions 91

Which one of the following controls is not particularly effective against the insider threat?

Options:

A.

Least privilege

B.

Background checks

C.

Firewalls

D.

Separation of duties

Buy Now
Questions 92

Which term describes a communication tunnel that provides point-to-point transmission of both authentication and data traffic over an untrusted network?

Options:

A.

Zero Trust

B.

DMZ

C.

VPN

D.

None of the Above

Buy Now
Questions 93

The requirement of both the manager and the accountant to approve the transaction fund exceeding $ 50000. Which security concept best suits this

Options:

A.

MAC

B.

Defence in Depth

C.

Two Person integrity

D.

Principle of least privilege

Buy Now
Questions 94

The mitigation of violations of security policies and recommended practices

Options:

A.

DR

B.

IR

C.

Threat hunting

D.

Incident response

Buy Now
Questions 95

What is the main purpose of creating baseline in ensuring system integrity

Options:

A.

To compare the baseline with the current state of the systems

B.

To protect the information

C.

To understand the current state of the system

D.

AII

Buy Now
Questions 96

Exhibit.

information security is not built on which of the following?

Options:

A.

Confidentiality

B.

Availability

C.

Accessibility

D.

Integrity

Buy Now
Questions 97

Embedded systems and network-enabled devices that communicate with the internet are considered as

Options:

A.

Endpoint

B.

Node

C.

IOT

D.

Router

Buy Now
Questions 98

Which of the following uses registered port

Options:

A.

HTTP

B.

SMB

C.

TCP

D.

MS Sql server

Buy Now
Questions 99

Which is related to Standard

Options:

A.

NIST

B.

GDPR

C.

HIPAA

D.

ALL

Buy Now
Questions 100

Measure of the extent to which an entity is threatened by a potential circumstance or event and likelihood of occurrence

Options:

A.

Impact

B.

Risk

C.

Threat

D.

Threat Vector

Buy Now
Questions 101

Which one of the following groups is NOT normally part of an organization's cybersecurity incident response team?

Options:

A.

Technical Subject Matter Experts

B.

Cybersecurity Experts

C.

Management

D.

Law Enforcement

Buy Now
Questions 102

Which ensure maintaining business operations during or after an incident

Options:

A.

Incident Response

B.

Business Continuity

C.

Disaster Recovery

D.

AII

Buy Now
Questions 103

organization experiences a security event that potentially jeopardizes the confidentiality, integrity or availability of its information system. What term best describes this situation?

Options:

A.

Breach

B.

Event

C.

Incident

D.

Exploit

Buy Now
Questions 104

Which type of attack attempts to gain information by observing the devices power consumption

Options:

A.

DOS

B.

Side Channles

C.

XSS

D.

XSRF

Buy Now
Questions 105

What is the purpose of the post incident phase of incident response?

Options:

A.

To detect and analyze incidents

B.

To prepare for future incidents

C.

To document lessons learned and improve future incident response effectiveness

D.

To containment and eradicate incidents

Buy Now
Questions 106

A security practitioner who needs step-by-step instructions to complete a provisioning task

Options:

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or Regulations

Buy Now
Questions 107

Your organization is concerned about network security and wants to prevent unauthorized access to its resources by implementing a security model where the network has not trusted space what type of security model is this

Options:

A.

Zero trust

B.

Trusted computing

C.

Trusted platform modelus

D.

Trusted execution environment

Buy Now
Questions 108

Which is the SSH port

Options:

A.

21

B.

23

C.

24

D.

22

Buy Now
Questions 109

A company security team detected a cyber attack against it information systems and activates a set of procedures to mitigate the attack., What type of plan is this?

Options:

A.

Business continuty plan

B.

Incident response plan

C.

Disaster recvoery plan

D.

Security operation plan

Buy Now
Questions 110

Which of the following best describes the puposes of a business impact analysis?

Options:

A.

To document a predetermined set of instructions or procedures for restoring IT and communications services after a disruption

B.

To mitigate security violation and ensure that business operation can continue during a contigency

C.

To provide a high level overview of the disaster recovery plan

D.

To analyze an information systems requirements and functions in order to determine system contingency priorities

Buy Now
Questions 111

Communication between end systems is encrypted using a key, often known as________?

Options:

A.

Temporary Key

B.

Section Key

C.

Public Key

D.

Session Key

Buy Now
Questions 112

Is the right of an individual to control the distribution of information about themselves

Options:

A.

Confidentiality

B.

Integrity

C.

Privacy

D.

Availability

Buy Now
Questions 113

What is the first component the new security engineer should learn about in the incident response plan?

Options:

A.

Detection and analysis

B.

Preparation

C.

Containment

D.

Eradication

Buy Now
Questions 114

What is the importance of non-repudiation in todays world of ecommerce

Options:

A.

It ensures that people are not held responsible for transaction that did not conduct

B.

It ensures that people are held responsible for transactions they conducted

C.

It ensures that transactions are not conducted online

D.

It ensures that transactions are conducted online

Buy Now
Questions 115

An outward-facing IP address used to access the Internet.

Options:

A.

Global Address

B.

Private Address

C.

Public Address

D.

DNS

Buy Now
Questions 116

Permitting authorized access to information while protecting it from improper disclosure

Options:

A.

Integrity

B.

Confidentiality

C.

Availability

D.

ALL

Buy Now
Questions 117

What is the main challenge in achieving non repudiation in electronic transactions

Options:

A.

Ensuring the identity of the sender and recipient is verified

B.

Ensuring the authenticity and integrity of the message

C.

Making sure the message is not tampered with during transmission

D.

All of the above

Buy Now
Questions 118

Which plan provides the team with immediate response procedures and check lists and guidance for management?

Options:

A.

BCP

B.

IRP

C.

DRP

D.

ALL

Buy Now
Questions 119

Raj is considering a physical deterrent control to dissuade unauthorized people from entering the organization's property. Which of the following would serve this purpose?

Options:

A.

A wall

B.

Razor tape

C.

A sign

D.

A hidden camera

Buy Now
Questions 120

What goal of security is enhanced by a strong business continuity program?

Options:

A.

non-repudiation

B.

Availability

C.

Confidentiality

D.

Integrity

Buy Now
Questions 121

Configuration settings or parameters stored as data, managed through a software graphical user interface (GUI) is

Options:

A.

Logical access control

B.

Physical access control

C.

Administrative Access control

Buy Now
Questions 122

Risk tolerance also known as

Options:

A.

Risk threshold

B.

Risk appetite

C.

Acceptable risk

D.

AII

Buy Now
Exam Code: CC
Exam Name: CC - Certified in Cybersecurity
Last Update: Oct 2, 2024
Questions: 407
$64  $159.99
$48  $119.99
$40  $99.99
buy now CC