Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 8 / 12
Total 403 questions

Which concept prevents crime by designing a physical environment that positively influences human behavior?

A.

DMZ

B.

Security alarm

C.

CPTED

D.

CCTV

Which type of attack takes advantage of vulnerabilities in validation?

A.

ARP spoofing

B.

Pharming attacks

C.

Cross-site scripting (XSS)

D.

DNS poisoning

Who must follow HIPAA compliance?

A.

Energy sector

B.

Health care

C.

Finance sector

D.

All

According to ISC2 Code of Ethics, to whom does Kristal ultimately report?

A.

The company

B.

Governments

C.

ISC2

D.

The users

VLAN hopping belongs to which OSI layer?

A.

Layer 3

B.

Layer 4

C.

Layer 7

D.

Layer 2

Which is NOT a component of a Business Continuity (BC) plan?

A.

Immediate response procedures

B.

Notification systems

C.

Management authority guidance

D.

Management

Which of the following is NOT one of the three main components of an SQL database?

A.

Views

B.

Schemas

C.

Tables

D.

Object-oriented interfaces

The concept of integrity applies to:

A.

Organization

B.

Information systems and business processes

C.

People

D.

All

An entity that exploits system vulnerabilities is known as a:

A.

Attacker

B.

Threat vector

C.

Threat

D.

Threat actor

What does a breach refer to in the context of cybersecurity?

A.

An unauthorized access to a system or system resource

B.

Any observable occurrence in a network or system

C.

A deliberate security incident

D.

A previously known system vulnerability