Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 6 / 13
Total 407 questions

Which of these is the most efficient and effective way to test a business continuity plan

A.

Simulations

B.

Discussions

C.

Walkthroughs

D.

Reviews

A portion of the organization's network that interfaces directly with the outside world; typically, this exposed area has more security controls and restrictions than the rest of the internal IT environment.

A.

Virtual private network (VPN)

B.

Virtual local area network (VLAN)

C.

Zero Trust

D.

Demilitarized zone (DMZ)

Natalia is concerned about the security of his organization's domain name records and would like to adopt a technology that ensures their authenticity by adding digital signatures. Select the MOST appropriate technology to use?

A.

DNSSIGN

B.

DNSSEC

C.

CERTDNS

D.

DNS2

A company network experience a sudden flood of network packets that causes major slowdown in internet traffic. What type of event it this?

A.

Security incident

B.

Natural disaster

C.

Exploit

D.

Adverse event

What does internal consistency of information refer to

A.

Data being accurate, usefull and complete

B.

Data being protected from errors or loss of information

C.

All instances of data being identical in form content and meaning

D.

Data being displayed and stored the same way on all system

Events with a negative consequence, such as system crashes, network packet floods, unauthorized use of system privileges, defacement of a web page or execution of malicious code that destroys data.

A.

Breach

B.

Incident

C.

Adverse Event

D.

Exploit

Which protocol is used for secure email

A.

POP3S

B.

IMAPS

C.

SMTPS

D.

AII

Organization experiences a security event that does not affect the confidentiality integrity and availability of its information system. What term BEST describes this situation?

A.

Exploit

B.

Breach

C.

Incident

D.

Event

Four main components of Incident Response are

A.

Preparation, Detection and Analysis, Containment, Eradication a

B.

Preparation, Detection, Analysis and Containment

C.

Detection, Analysis, Containment, Eradication and Recovery

D.

AII

organization experiences a security event that potentially jeopardizes the confidentiality, integrity or availability of its information system. What term best describes this situation?

A.

Breach

B.

Event

C.

Incident

D.

Exploit