Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 11 / 12
Total 403 questions

Which layer provides services directly to the user?

A.

Application Layer

B.

Session Layer

C.

Presentation Layer

D.

Physical Layer

In incident terminology, a zero-day is:

A.

Days with a cybersecurity incident

B.

A previously unknown system vulnerability

C.

Days without a cybersecurity incident

D.

Days to solve a previously unknown system vulnerability

Limiting access based on data sensitivity and user authorization is known as:

A.

DAC

B.

MAC

C.

RuBAC

D.

RBAC

IDS can be described in terms of what fundamental functional components?

A.

Response

B.

Information sources

C.

Analysis

D.

All of the choices

Hashing safeguards which CIA triad principle?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

All

A LAN-based attack involving malicious packets sent to the default gateway:

A.

ARP poisoning

B.

SYN flood

C.

Ping of death

D.

Trojan

Why is identifying roles and responsibilities important in IR planning?

A.

To prevent incidents

B.

To ensure everyone knows their role

C.

To reduce impact

D.

To select containment strategy

Which allows extremely granular restrictions down to individual machines or users?

A.

DMZ

B.

Microsegmentation

C.

VLAN

D.

NAC

Created by switches to logically segment a network without changing physical topology:

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

A team activates procedures to mitigate a cyberattack. What plan is this?

A.

Business Continuity Plan

B.

Incident Response Plan

C.

Disaster Recovery Plan

D.

Security Operations Plan