Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 9 / 12
Total 403 questions

An IP network protocol standardized by the IETF through RFC 792 to determine if a host is available is:

A.

IP

B.

ICMP

C.

IGMP

D.

HTTP

The practice of sending fraudulent communications that appear to come from a reputable source is known as:

A.

DoS

B.

Virus

C.

Spoofing

D.

Phishing

Exhibit.

information security is not built on which of the following?

A.

Confidentiality

B.

Availability

C.

Accessibility

D.

Integrity

What does the termbusinessin business continuity planning refer to?

A.

The financial performance of the organization

B.

The technical systems of the organization

C.

The operational aspects of the organization

D.

The physical infrastructure of the organization

Which of the following is unlikely to be a member of the disaster recovery team?

A.

Executive management

B.

Public relations

C.

Billing clerk

D.

IT personnel

Running simulated instances of a computer system abstracted from underlying hardware is called:

A.

Containerization

B.

Simulation

C.

Emulation

D.

Virtualization

Critical business functions are disrupted due to a system outage. Which plan sustains operations?

A.

DRP

B.

BCP

C.

IRP

D.

All

What does Personally Identifiable Information (PII) pertain to?

A.

Information about an individual's health status

B.

Data about an individual that could be used to identify them

C.

Trade secrets, research, business plans, and intellectual property

D.

The importance assigned to information by its owner

Example of a deterrent control:

A.

CCTV

B.

BCP

C.

DRP

D.

IRP

A popular way of implementing the principle of least privilege is:

A.

MAC

B.

DAC

C.

RBAC

D.

ABAC