Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC CC - CC - Certified in Cybersecurity

Page: 12 / 13
Total 407 questions

Which version of TLS is considered to be the most secure and recommended for use?

A.

TLS 1.0

B.

TLS 1.1

C.

TLS 1.2

D.

TLS 1.3

What is the purpose of immediate response procedures and checklists in a BCP

A.

To notify personnel that the BCP is being enacted

B.

To provide guidance for management

C.

To safeguard the confidentiality, integrity and availability of information

D.

To ensure business operations are accounted for in the plan

What is the main purpose of creating baseline in ensuring system integrity

A.

To compare the baseline with the current state of the systems

B.

To protect the information

C.

To understand the current state of the system

D.

AII

Which of the following physical controls is used to protect against eavesdropping and data theft through electromagnetic radiation

A.

EMI Shielding

B.

Screening rooms

C.

White noise generators

D.

ALL

Which is not the function of IPS

A.

To encrypt network traffic

B.

To monitor network traffic

C.

To filter network traffic

D.

To detect and prevent attacks

Why is an asset inventory much important?

A.

It tells you what to encrypt

B.

The law requires it

C.

It contains a price list

D.

You can't protect what you don't know you have

What is privacy in the context of Information Security?

A.

Protecting data from unauthorized access

B.

Ensuring data is accurate and unchanged

C.

Making sure data is always accessible when needed.

D.

Disclosed without their consent

A new BYOD policy has been enforced in NEW Corp which type of control is used to enforce thissecurity policies

A.

Physical control

B.

Logical Control

C.

Administrative Control

D.

Technical Control

While taking the certification exam for ISC2 CC, You notice another candidate for the certification cheating. What should you do?

A.

Yell at the other candidate for violating test security.

B.

Nothing—each person is responsible for their own actions.

C.

Report the candidate to ISC2.

D.

Call local law enforcement.

Common network device used to connect networks?

A.

Server

B.

Endpoint

C.

Router

D.

Switch