Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 1 / 13
Total 407 questions

What is the purpose of the post incident phase of incident response?

A.

To detect and analyze incidents

B.

To prepare for future incidents

C.

To document lessons learned and improve future incident response effectiveness

D.

To containment and eradicate incidents

Which plan provides the team with immediate response procedures and check lists and guidance for management?

A.

BCP

B.

IRP

C.

DRP

D.

ALL

Example of Technical controls

A.

Security Guard

B.

GPS installed in vehicle to track location

C.

Door Lock

D.

None

Which type of software testing focuses on examining the source code for vulnerabilities and security issues?

A.

Black-box testing

B.

White-box testing

C.

Functional testing

D.

User acceptance testing

Which of these is an example of deterrent control

A.

Biometric

B.

Guard Dog

C.

Encryption

D.

Trunstile

Which of the following is endpint

A.

Router

B.

Firewall

C.

Laptop

D.

Switch

Communication between end systems is encrypted using a key, often known as________?

A.

Temporary Key

B.

Section Key

C.

Public Key

D.

Session Key

Which OSI layer VPN works

A.

Layer 5

B.

Layer 6

C.

Layer 1

D.

Layer 3

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called______

A.

Malware

B.

Zero-day

C.

Event

D.

Attack

Which type of control is used to minimize the impact of an attack and to restore normal operations as quick as possible

A.

Compensatory Control

B.

Corrective Control

C.

Recovery control

D.

Detective Control