ISC CC - CC - Certified in Cybersecurity
What is the primary goal of Identity and Access Management (IAM) in cybersecurity?
Which document identifies the principles and rules governing an organization’s protection of information systems and data?
An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant is known as:
Which type of control minimizes the impact of an attack and restores normal operations as quickly as possible?
COVID-19 is an example where which plan sustains business?
Configuration settings or parameters stored as data and managed through a GUI are examples of:
A set of security controls or system settings used to ensure uniformity of configuration through the IT environment?
A set of instructions to detect, respond to, and recover from security incidents is a:
Which of the following documents contains elements that are NOT mandatory?
The process of applying secure configurations to reduce the attack surface is known as:
