Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 2 / 13
Total 407 questions

What is the primary goal of the incident management team in the organization

A.

Reduce the impact and resore services

B.

Gathering and analyzing information

C.

Conducting Leason learn meeting

D.

RCA of the impact

Which of these is WEAKEST form of authentication we can implement?

A.

Something you know

B.

Something you are

C.

Something you have

D.

Biometric authentications

Which access control model grants permission based on the sensitivity of the data and the user job functions

A.

DAC

B.

RBAC

C.

MAC

D.

RUBAC

Measure of the extent to which an entity is threatened by a potential circumstance or event and likelihood of occurrence

A.

Impact

B.

Risk

C.

Threat

D.

Threat Vector

Which layer of the OSI layer model is responsible for associate MAC addresses to network devices

A.

Physical layer

B.

Network layer

C Data link layer

C.

Transport layer

Which access control model can grant access to a given object based on complex rules

A.

ABAC

B.

DAC

C.

MAC

D.

RBAC

Which of the following is NOT one of the four typical ways of managing risk?

A.

Accept

B.

Avoid

C.

Mitigate

D.

Monitor

What is meant by non-repudiation?

A.

If a user does something, they can't later claim that they didn't do it.

B.

Controls to protect the organization's reputation from harm due to inappropriate social media postings by employees, even if on their private accounts and personal time.

C.

It is part of the rules set by administrative controls.

D.

It is a security feature that prevents session replay attacks.

Who is responsible for publishing and signing the organization s policies?

A.

The security office

B.

Human resources

C.

Senior management

D.

The legal department

Dylan is creating a cloud architecture that requires connections between systems in two different private VPCs. What would be the best way for Dylan to enable this access?

A.

VPN Connection

B.

Internet Gateway

C.

Public IP Address

D.

VPC Endpoint