Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 7 / 12
Total 403 questions

Which is a component of a Business Continuity (BC) plan?

A.

Immediate response procedures

B.

Notification systems and call trees

C.

Management authority guidance

D.

All

Who should participate in creating a BCP?

A.

IT only

B.

Management only

C.

Members across the organization

D.

Finance only

If a device is found to be non-compliant with the security baseline, what action should the security team take?

A.

Report

B.

Evaluate

C.

Ignore

D.

Disable or isolate it into a quarantine area until it can be checked and updated

Which IR phase involves identifying critical data and systems?

A.

Detection and analysis

B.

Preparation

C.

Containment

D.

Eradication

Which version of TLS is considered the most secure and recommended for use?

A.

TLS 1.0

B.

TLS 1.1

C.

TLS 1.2

D.

TLS 1.3

The common term for systems that control temperature and humidity in a data center is:

A.

VLAN

B.

STAT

C.

TAWC

D.

HVAC

Exhibit.

IPSec works in which layer of OSI Model

A.

Layer 2

B.

Layer 5

C.

Layer 3

D.

Layer 7

A DDoS attack affects which OSI layers?

A.

Network layer

B.

Transport layer

C.

Physical layer

D.

Both A and B

Which access control method uses attributes and rules evaluated by a central Policy Decision Point (PDP)?

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

What is the main challenge in achieving non-repudiation in electronic transactions?

A.

Verifying sender and recipient identity

B.

Ensuring message authenticity and integrity

C.

Preventing message tampering

D.

All of the above