Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 4 / 12
Total 403 questions

Which type of control is used to restore systems or processes to their normal state after an attack?

A.

Compensatory control

B.

Recovery control

C.

Detective control

D.

Corrective control

The purpose of risk identification is:

A.

Employees at all levels help identify risks

B.

Identify risks to communicate clearly

C.

Identify risks to protect against them

D.

All

Which of the following is a characteristic of cloud computing?

A.

Broad network access

B.

Rapid elasticity

C.

Measured service

D.

All

A measure of an organization’s baseline security performance is a:

A.

Security assessment

B.

Security audit

C.

Security benchmark

D.

Security management

Which authentication enables automatic identification across multiple service providers?

A.

Basic

B.

Kerberos

C.

Token-based

D.

Federated

What is the primary factor in the reliability of information and systems?

A.

Authenticity

B.

Confidentiality

C.

Integrity

D.

Availability

Which of the following is often associated with Disaster Recovery planning?

A.

Checklists

B.

Antivirus

C.

Firewalls

D.

All

What is an IP address?

A.

A physical address

B.

A vendor identifier

C.

A logical address associated with a network interface

D.

A hardware address

How often should an organization test its BCP?

A.

Continually

B.

Annually

C.

Routinely

D.

Daily

Which cloud service model provides the most suitable environment for customers to build and operate their own software?

A.

SaaS

B.

IaaS

C.

PaaS