Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 10 / 12
Total 403 questions

Which one of the following groups is NOT normally part of an organization's cybersecurity incident response team?

A.

Technical subject matter experts

B.

Cybersecurity experts

C.

Management

D.

Law enforcement

Which of the following is NOT a protocol of OSI Layer 3?

A.

IGMP

B.

IP

C.

ICMP

D.

SSH

In which access control model can the creator of an object delegate permissions?

A.

MAC

B.

RBAC

C.

ABAC

D.

DAC

You experienced a power outage that disrupted access to your data center. What type of security concern occurred?

A.

Availability

B.

Confidentiality

C.

Non-repudiation

D.

Integrity

A device that forwards traffic to the port of a known destination device is a:

A.

Switch

B.

Hub

C.

Router

D.

Ethernet

Why is an asset inventory so important?

A.

It tells you what to encrypt

B.

The law requires it

C.

It contains a price list

D.

You can’t protect what you don’t know you have

In Mandatory Access Control (MAC), which statement is true?

A.

Users access data based on need-to-know

B.

Access controls cannot be changed except by administrators

C.

Data owners modify access

D.

Users control permissions

Which approach involves a continuous cycle of identifying, assessing, prioritizing, and mitigating cybersecurity risks?

A.

Security assessment

B.

Incident response

C.

Penetration testing

D.

Risk management

When operating in a cloud environment, which cloud deployment model provides security teams with the greatest access to forensic information?

A.

FaaS

B.

SaaS

C.

PaaS

D.

IaaS

Which plan is activated when Incident Response and BCP fail?

A.

Risk management

B.

BIA

C.

DRP

D.

None