Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 6 / 12
Total 403 questions

What is the primary goal of Identity and Access Management (IAM) in cybersecurity?

A.

To ensure 100% security against all threats

B.

To provide secure and controlled access to resources

C.

To eliminate the need for user authentication

D.

To monitor network traffic for performance optimization

Which document identifies the principles and rules governing an organization’s protection of information systems and data?

A.

Procedure

B.

Guideline

C.

Policy

D.

Standard

An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant is known as:

A.

Eavesdropping attack

B.

CSRF

C.

XSS

D.

ARP spoofing

Which type of control minimizes the impact of an attack and restores normal operations as quickly as possible?

A.

Compensatory control

B.

Corrective control

C.

Recovery control

D.

Detective control

COVID-19 is an example where which plan sustains business?

A.

IRP

B.

DRP

C.

BCP

D.

All

Configuration settings or parameters stored as data and managed through a GUI are examples of:

A.

Logical access control

B.

Physical access control

C.

Administrative access control

A set of security controls or system settings used to ensure uniformity of configuration through the IT environment?

A.

Patches

B.

Inventory

C.

Baseline

D.

Policy

A set of instructions to detect, respond to, and recover from security incidents is a:

A.

BCP

B.

IRP

C.

DRP

D.

None

Which of the following documents contains elements that are NOT mandatory?

A.

Procedures

B.

Policies

C.

Regulations

D.

Guidelines

The process of applying secure configurations to reduce the attack surface is known as:

A.

Security assessment

B.

Security evaluation

C.

Security benchmark

D.

Security hardening