Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 5 / 13
Total 407 questions

The practice of ensuring that an organizational process cannot be completed by a single person; forces collusion as a means to reduce insider threats.

A.

Segregation of Duties

B.

Principle of Least Privilege

C.

Privileged Account

D.

Rule-based access control

Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

A.

Brute-force attack

B.

Dictionary attack

C.

Social engineering attack

D.

Replay attack

Type of cyber attack carried out over a LAN that involves sending malicious packets to a default gateway on a LAN

A.

ARP Poisoning

B.

Syn Flood

C.

Ping of death

D.

Trojan

Which is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary's attack lifecycle and the platforms they are known to target

A.

MITRE ATT&CK

B.

CVE

C.

Risk Management framework

D.

Security Management

A Hacker launched a specific attack to exploit a known system vulnerability. What term best describes this situation?

A.

Breach

B.

Event

C.

Exploit

D.

Intrusion

Which document serve as specifications for the implementation of policy and dictates mandatory requirements

A.

Policy

B.

Guideline

C.

Standard

D.

Procedures

Which protocol would be most suitable to fulfill the secure communication requirements between clients and the server for a company deploying a new application?

A.

FTP

B.

HTTP

C.

HTTPS

D.

SMTP

A one-way spinning door or barrier that allows only one person at a time to enter a building or pass through an area.

A.

Turnstile

B.

ManTrap

C.

Bollard

D.

Gate

Which type of attack takes advantage of vulnerabilities in validation?

A.

ARP spoofing

B.

Pharming attacks

C.

Cross-site scripting (XSS)

D.

DNS poisoning

The means by which a threat actor carries out their objectives

A.

Threat

B.

Threat Vector

C.

Exploit

D.

Intrusion