Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC CC - CC - Certified in Cybersecurity

Page: 1 / 12
Total 403 questions

What is the end goal of a Disaster Recovery Plan (DRP)?

A.

All systems backed up

B.

DR site activated

C.

Infrastructure relocated

D.

Business restored to last-known reliable operations

What is the main purpose of digital signatures?

A.

Encrypt data

B.

Verify sender identity and ensure message integrity

C.

Prevent network access

D.

Compress data

Permitting authorized access while preventing improper disclosure.

A.

Integrity

B.

Confidentiality

C.

Availability

D.

All

Which access control model can grant access to a given object based on complex rules?

A.

ABAC

B.

DAC

C.

MAC

D.

RBAC

Type 1 authentication poses which risks?

A.

Users may share their credentials with others

B.

Users may forget their passwords

C.

Passwords may be intercepted and stolen

D.

All

Which access control model is best suited for a large organization with many departments and varied access needs?

A.

DAC

B.

RBAC

C.

MAC

D.

RuBAC

Which security control is most commonly used to prevent data breaches?

A.

Physical control

B.

Logical control

C.

Administrative control

D.

RBAC

What is the difference between a hub and a switch?

A.

A hub is less likely to be used in home networks

B.

A hub can create separate broadcast domains

C.

A hub retransmits traffic to all devices, while a switch sends traffic only to the intended device

D.

A switch retransmits traffic to all devices

Which TLS extension is used to optimize the TLS handshake process by reducing the number of round trips between the client and server?

A.

TLS Renegotiation

B.

TLS Heartbeat

C.

TLS Session Resumption

D.

TLS FastTrack

Derrick logs on to a system in order to read a file. In this example, Derrick is the ______?

A.

Subject

B.

Object

C.

Process

D.

Predicate