Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 3 / 12
Total 403 questions

Example of token-based authentication:

A.

Kerberos

B.

Basic

C.

OAuth

D.

NTLM

The method of distributing network traffic equally across a pool of resources is called:

A.

VLAN

B.

DNS

C.

VPN

D.

Load balancing

What is the purpose of immediate response procedures in a BCP?

A.

To notify personnel the BCP is activated

B.

To guide management

C.

To protect CIA

D.

To account for operations

Why is a “Red Book” important in Business Continuity Planning?

A.

To have a hard copy for easy access

B.

Easy to carry and transfer

C.

When disasters disable power and electronic access

D.

All

The last phase in the data security lifecycle is:

A.

Encryption

B.

Destruction

C.

Archival

D.

Backup

A hacker intercepts network traffic to steal login credentials. Which OSI layer is being attacked?

A.

Data Link layer

B.

Physical layer

C.

Network layer

D.

Application layer

The process of how an organization is managed and how decisions are made is called:

A.

Standard

B.

Policy

C.

Procedure

D.

Governance

Which encryption type is used in HTTPS communication?

A.

Symmetric

B.

Asymmetric

C.

None

D.

Both A and B

Access control used in high-security military and government environments:

A.

DAC

B.

MAC

C.

RBAC

D.

ABAC

Which of the following is NOT a social engineering technique?

A.

Pretexting

B.

Baiting

C.

Quid pro quo

D.

Double dealing