Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 5 / 12
Total 403 questions

What should be done to limit damage caused by a ransomware attack?

A.

Use a different email client

B.

Add more domain administrators

C.

Delete all emails with attachments

D.

Limit administrative privileges to only when required

Which type of risk involves unauthorized use or disclosure of confidential information such as passwords, financial data, or personal information?

A.

Compliance risk

B.

Reputational risk

C.

Operational risk

D.

Information risk

Which one of the following cryptographic algorithms does NOT depend upon the prime factorization problem?

A.

RSA – Rivest-Shamir-Adleman

B.

GPG – GNU Privacy Guard

C.

ECC – Elliptic Curve Cryptosystem

D.

PGP – Pretty Good Privacy

An employee unintentionally shares confidential information with an unauthorized party. What term best describes this?

A.

Event

B.

Exploit

C.

Intrusion

D.

Breach

What is meant by non-repudiation?

A.

If a user does something, they can't later claim that they didn't do it.

B.

Controls to protect the organization's reputation from harm due to inappropriate social media postings by employees, even if on their private accounts and personal time.

C.

It is part of the rules set by administrative controls.

D.

It is a security feature that prevents session replay attacks.

Uses multiple types of access controls in layered fashion to avoid monolithic security:

A.

DMZ

B.

VLAN

C.

Defense in Depth

D.

VPN

Which one of the following controls is NOT particularly effective against the insider threat?

A.

Least privilege

B.

Background checks

C.

Firewalls

D.

Separation of duties

A collection of actions that must be followed to complete a task or process in accordance with a set of rules is known as:

A.

Policy

B.

Procedure

C.

Law

D.

Standard

Which principle aims primarily at fraud detection?

A.

Defense in depth

B.

Least privilege

C.

Separation of duties

D.

Privileged account

Are events that may indicate that an organization's systems or data have been compromised or that protective measures have failed.

A.

Exploit

B.

Security incident

C.

Threat

D.

Breach