Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 3 / 13
Total 407 questions

Which of the following is often associated with DR planning?

A.

Checklists

B.

Antivirus

C.

firewall

D.

AII

Which authentication helps build relationships between different technology providers, enabling automatic identification and user access. Employees no longer need to enter separate usernames and passwords when visiting a new service provider

A.

Basic

B.

Kerberos

C.

Token Based

D.

Federated

Is the right of an individual to control the distribution of information about themselves

A.

Confidentiality

B.

Integrity

C.

Privacy

D.

Availability

Which type of control is used to restore systems or processes to their normal state after an attack has occurred

A.

Compensatory Control

B.

Recovery Control

C.

Detective Control

D.

Corrective Control

In which cloud model does the cloud customer have less responsibility over the infrastructure

A.

FaaS

B.

SaaS

C.

laaS

D.

PaaS

Which penetration testing technique requires the team to do the MOST work and effort?

A.

White box

B.

Blue box

C.

Gray box

D.

Black box

Which layer provides the services to user?

A.

Application layers

B.

Session Layers

C.

Presentation Layer

D.

Physical Layer

A type of malware that downloads onto a computer disguised as a legitimate program

A.

Worm

B.

Trojan

C.

virus

D.

Ransomware

Which type of encryption uses only one shared key to encrypt and decrypt?

A.

Public key

B.

Asymmetric

C.

Symmetric

D.

TCB key

What is sensitivity in the context of confidentiality

A.

The harm caused to externl stakeholders if information is disclosed or modified

B.

The ability of information to be accessed only by authorized individuals

C.

The need for protection assigned to information by its owner

D.

The Health status of the individuals