Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC CC - CC - Certified in Cybersecurity

Page: 10 / 13
Total 407 questions

Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?

A.

Non-repudiation

B.

Integrity

C.

Availability

D.

Confidentiality

What is an IP address

A.

A physical address used to connect multiple devices in a network

B.

An address that denotes the vendor or manufacturer of the physical network interface

C.

A Logical address associated with a unique network interface within the network

D.

An Address that represents the network interface within the network

COVID-19 is one of the perfect example of a situation, where a________plan is

enacted to sustain the business

A.

IRP

B.

DRP

C.

BCP

D.

ALL

Which type of malware encrypts a users file system and demands payment in exchange of decrypting key

A.

Worm

B.

Trojan

C.

virus

D.

Ransomware

The testing or evaluation of security controls to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for an information system or organization.

A.

Security Assessment

B.

Risk Assessment

C.

DRP

D.

IRP

Which of the following principles aims primarily at fraud detection

A.

Defense in depth

B.

Least privilege

C.

Separation of duties

D.

Privileged account

What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?

A.

Least privilege

B.

Two person control

C.

Job rotation

D.

Separation of privileges

Which element of the security policy framework includes recommendation that are NOT bindings?

A.

Procedures

B.

Guidelines

C.

Standards

D.

Policies

Is a way to prevent unwanted devices from connecting to a network.

A.

DMZ

B.

VPN

C.

VLAN

D.

NAC

A Company wants to ensure that its employees can access the network resources from anywhere in the world which access control model is best suited for this scenario

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC