Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the ISC certification CC Questions and answers with Dumpstech

Exam CC Premium Access

View all detail and faqs for the CC exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions
Questions # 91:

Granting a user access to services or a system is known as:

Options:

A.

Authentication

B.

Identification

C.

Authorization

D.

Confidentiality

Questions # 92:

Which scenario best represents defense in depth?

Options:

A.

Relying only on a firewall

B.

Storing all data on one server

C.

Requiring only a username and password

D.

None

Questions # 93:

Which of the following is NOT one of the three main components of an SQL database?

Options:

A.

Views

B.

Schemas

C.

Tables

D.

Object-oriented interfaces

Questions # 94:

Faking the sender address of a transmission to gain illegal entry is called:

Options:

A.

Phishing

B.

ARP

C.

Spoofing

D.

All

Questions # 95:

Permitting authorized access while preventing improper disclosure.

Options:

A.

Integrity

B.

Confidentiality

C.

Availability

D.

All

Questions # 96:

Which one of the following controls is NOT particularly effective against the insider threat?

Options:

A.

Least privilege

B.

Background checks

C.

Firewalls

D.

Separation of duties

Questions # 97:

Exhibit.

Question # 97

What is the purpose of a Security Information and Event Management (SIEM) system?

Options:

A.

Encrypting files

B.

Monitoring and analyzing security events -

C.

Blocking malicious websites

D.

Managing user passwords

Questions # 98:

Dylan is creating a cloud architecture that requires connections between systems in two different private VPCs. What is the BEST way to enable this access?

Options:

A.

VPN connection

B.

Internet gateway

C.

Public IP address

D.

VPC endpoint

Questions # 99:

Which is the loopback address?

Options:

A.

::1

B.

127.0.0.1

C.

255.255.255.0

D.

Both A and B

Questions # 100:

Configuration settings or parameters stored as data and managed through a software graphical user interface (GUI) are examples of:

Options:

A.

Logical access control

B.

Physical access control

C.

Administrative access control

Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions