Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 2 / 12
Total 403 questions

A company’s servers are down due to malware. What is the FIRST step the DR team should take?

A.

Disconnect affected systems

B.

Conduct risk assessment

C.

Restore from backups

D.

Contact law enforcement

Representation of data at OSI Layer 3 is called a:

A.

Segment

B.

Packet

C.

Frame

D.

None of the above

After an earthquake disrupts business operations, which document contains the reactive procedures required to return business to normal operations?

A.

Business Impact Analysis

B.

Business Continuity Plan

C.

Disaster Recovery Plan

D.

Business Impact Plan

Which fire suppression system is more friendly to electronics?

A.

Carbon dioxide–based

B.

Chemical-based

C.

Water-based

D.

Foam-based

A measure of the degree to which an organization depends on information or systems to achieve its mission is called:

A.

Availability

B.

Criticality

C.

Authorization

D.

Confidentiality

How does IPSec protect against replay attacks?

A.

By using sequence numbers

B.

By limiting network access

C.

By using digital signatures

D.

By encrypting all traffic

What is the primary goal of an incident management team?

A.

Reduce impact and restore services

B.

Gathering and analyzing information

C.

Conducting lessons learned meetings

D.

Root cause analysis

Firewalls operate at which OSI layers?

A.

Layer 3

B.

Layer 4

C.

Layer 7

D.

All

Exhibit.

How many keys would be required to support 50 users in an asymmetric cryptography system?

A.

100

B.

200

C.

50

D.

1225

Ensuring a process cannot be completed by a single person is known as:

A.

Segregation of duties

B.

Least privilege

C.

Privileged account

D.

Rule-based access control