Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC CC - CC - Certified in Cybersecurity

Page: 11 / 13
Total 407 questions

A company performs an analysis of its information systems requirements functions and interdependences in order to prioritize contingency requirement. What is this process called?

A.

BCP

B.

DRP

C.

IRP

D.

BIA

Why is the recovery of IT often crucial to the recovery and sustainment of business operations

A.

IT is not important to business operation

B.

IT often the cause for the disaster

C.

IT can be easily recovers without any impact of business operations

D.

Many business rely heavily on IT for their operations

An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant

A.

Eavesdropping Attack

B.

CSRF

C.

XSS

D.

ARP Spoofing

A company network has been infected with malware and all its servers are down. What is the first step that the Disaster Recovery team should take to restore the systems?

A.

Disconnect the affected systems from the network

B.

Conduct a risk assessment of determine the extent of the damage

C.

Restore data from backup systems

D.

Contact the enforcement to investigate the cyberattack

Also known as a virtual machine monitor or VMM, is software that creates and runs virtual machines (VMs)

A.

Hypervisor

B.

Simulation

C.

Emulation

D.

Cloud Controller

In the context of cybersecurity, typical threat actors include the following:

A.

Insiders (either deliberately, by simple human error, or by gross incompetence).

B.

Outside individuals or informal groups (either planned or opportunistic, discovering vulnerability).

C.

Technology (such as free-running bots and artificial intelligence

D.

All

Networks are often micro segmented networks, with firewalls at nearly every connecting point

A.

DMZ

B.

VPN

C.

VLAN

D.

Zero Trust

Mark is configuring an automated data transfer between two hosts and is choosing an authentication technique for one host to connect to the other host. What approach would be best-suited for this scenario?

A.

Biometric

B.

Smart Card

C.

SSH Key

D.

Hard Coded Password

What is the first step in incident response planning

A.

Develop a policy approved by management

B.

Identify critical data and systems

C.

Train staff on incident response

D.

implement an incident response team

Which uses encrypted, machine-generated codes to verify a user's identity.

A.

Basic Authentication

B.

Form Based Authentication

C.

Token Based Authentication

D.

AII