Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC CC - CC - Certified in Cybersecurity

Page: 8 / 13
Total 407 questions

Which of the following is a systematic approach to protecting against cyber threats that involves a continuous cycle of identifying, assessing and prioritizing risks and implementing measures to reduce or eliminate those risks?

A.

Security Assessment

B.

Incident response

C.

Peneteration testing

D.

Risk Management

Which ensure maintaining business operations during or after an incident

A.

Incident Response

B.

Business Continuity

C.

Disaster Recovery

D.

AII

Exhibit.

How many keys would be required to support 50 users in an asymmetric cryptography system?

A.

100

B.

200

C.

50

D.

1225

Which Prevents Threat

A.

Antivirus

B.

IDS

C.

SIEM

D.

HIDS

Part of a zero-trust strategy that breaks LANs into very small and highly localized zones using firewalls.

A.

Zero Trust

B.

DMZ

C.

VPN

D.

Micro Segmentation

Incident management is also known as

A.

Risk Management

B.

Business Continuity management

C.

Incident management

D.

Crisis management

What is the potential impact of an IPSec reply attack

A.

Modification of network traffic

B.

Disruption of network communication

C.

Unauthorized access to network resources

D.

ALL

Mark has purchased a MAC LAPTOP. He is scared of losing his screen and planning to buy an insurance policy. So, which risk management strategy is?

A.

Risk acceptance

B.

Risk deterrence

C.

Risk transference

D.

Risk mitigation

Which of the following is NOT one of the three main components of a sql database?

A.

Views

B.

Schemas

C.

Tables

D.

Object-oriented interfaces

Which of the following is very likely to be used in a disaster recovery (DR) effort?

A.

Guard dogs

B.

Contract personnel

C.

Data backups

D.

Anti-malware solutions