Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 4 / 13
Total 407 questions

The primary functionality of PAM is?

A.

Validate the level of access a user have to a file

B.

Prevent unauthorized access to organizational assets

C.

Provide just-in-time access to critical resources

D.

Manage centralized access control

Which one of the following controls is not particularly effective against the insider threat?

A.

Least privilege

B.

Background checks

C.

Firewalls

D.

Separation of duties

An entity that acts to exploit a target organizations system vulnerabilities is a

A.

Attacker

B.

Threat vector

C.

Threat

D.

Threat Actor

An outward-facing IP address used to access the Internet.

A.

Global Address

B.

Private Address

C.

Public Address

D.

DNS

What is the primary factor in the reliability of information and system

A.

Authenticity

B.

Confidentiality

C.

Integrity

D.

Availability

Load balancing safe guard which CIA triad

A.

Confidentiality

B.

Availablity

C.

Integrity

D.

All

Example of Dynamic authorization

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

Devid's team recently implemented a new system that gathers information from a variety of different log sources, analyses that information, and then triggers automated playbooks in response to security events, what term BEST describes this technology?

A.

SIEM

B.

Log Repository

C.

IPS

D.

SOAR

Derrick logs on to a system in order to read a file. In this example. Derrick is the______?

A.

Subject

B.

Object

C.

Process

D.

Predicate

Which of the following uses registered port

A.

HTTP

B.

SMB

C.

TCP

D.

MS Sql server