Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC CC - CC - Certified in Cybersecurity

Page: 9 / 13
Total 407 questions

What is the best practise to clear SSD storage after usage in term of cyber security

A.

Zero fill

B.

Degaussing

C.

Clearing

D.

Disintegration

A common network device used to filter traffic?

A.

Server

B.

Endpoint

C.

Ethernet

D.

Firewa

What is Remanence

A.

The ability of retaining magnetization in storage disk after deletion

B.

Files or pieces of files get scattered throughout your disks.

C.

Data corruption due to disk failure

D.

AII

What is the recommended fire suppression system for server rooms

A.

Foam based

B.

Water based

C.

Powder based

D.

ftac hacorl

Type 1 authentication posses

A.

Users may share their credential with others

B.

User may forgot their passwords

C.

Passwords may be intercepted and stolen

D.

ALL

If a device is found that is not compliant with the security baseline, what will be the security team action

A.

Report

B.

Evaluate

C.

Ignore

D.

Disabled or isolated into a quarantine area until it can be checked and updated.

Why is security training important?

A.

Because it fulfills regulatory requirements.

B.

Because it helps people to perform their job duties more efficiently.

C.

Because it reduces the risk of certain types of attacks, like social engineering.

D.

AII

XenServer, LVM, Hyper-V, ESXi are

A.

Type 2 Hypervisor

B.

Type 1 Hypervisor

C.

Both

D.

None

After an Earthquake disrupting business operations, which documents contains the reactive procedures required to return business to normal operations

A.

The Business Impact Analysis

B.

The Business Continuity Plan

C.

The Disaster Recovery plan

D.

The Business Impact Plan

What is the purpose of non-repudiation in information security?

A.

To ensure data is always accessible when needed

B.

To protect data from unauthorized access

C.

To prevent the sender or recipient of a message from denying having sent or received the message

D.

To ensure data is accurate and unchanged