Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 12 / 12
Total 403 questions

An unusual occurrence in a system or network is best described as:

A.

Breach

B.

Exploit

C.

Event

D.

Intrusion

What is sensitivity in the context of confidentiality?

A.

Harm caused to external stakeholders

B.

Ability of information to be accessed only by authorized users

C.

Need for protection assigned to information by its owner

D.

Health status of individuals

XenServer, LVM, Hyper-V, and ESXi are:

A.

Type 2 hypervisors

B.

Type 1 hypervisors

C.

Both

D.

None

What is the difference between Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)?

A.

BCP restores IT systems, DRP maintains business functions

B.

DRP restores IT and communications, BCP maintains critical business functions

C.

They are the same

D.

BCP only applies before disasters

What is an IPSec replay attack?

A.

An attack where an attacker modifies packets in transit

B.

An attack where an attacker eavesdrops on network traffic

C.

An attack where an attacker overloads a network with traffic

D.

An attack where an attacker attempts to inject packets in an existing session

Modern solutions that detect rootkits, ransomware, and spyware are:

A.

Antivirus

B.

IDS

C.

IPS

D.

Anti-malware

Restoring IT and communications after a disruption is the goal of:

A.

BCP

B.

IRP

C.

DRP

D.

None

Embedded systems and network-enabled devices that communicate with the Internet are considered:

A.

Endpoint

B.

Node

C.

IoT

D.

Router

Why is security training important?

A.

Because it fulfills regulatory requirements

B.

Because it helps people perform job duties more efficiently

C.

Because it reduces the risk of attacks such as social engineering

D.

All

Finance Server and Transaction Server have restored their original facility after a disaster. What should be moved in FIRST?

A.

Management

B.

Most critical systems

C.

Most critical functions

D.

Least critical functions