Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the ISC certification CC Questions and answers with Dumpstech

Exam CC Premium Access

View all detail and faqs for the CC exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions
Questions # 111:

A hacker launches a specific attack to exploit a known vulnerability. This is called:

Options:

A.

Breach

B.

Event

C.

Exploit

D.

Intrusion

Questions # 112:

What is the purpose of a Business Impact Analysis (BIA)?

Options:

A.

Restore IT services

B.

Mitigate security violations

C.

Provide DRP overview

D.

Analyze system requirements to determine recovery priorities

Questions # 113:

Which type of control minimizes the impact of an attack and restores normal operations as quickly as possible?

Options:

A.

Compensatory control

B.

Corrective control

C.

Recovery control

D.

Detective control

Questions # 114:

A company wants to prevent employees from bringing unauthorized electronic devices into the workspace. Which physical control is best?

Options:

A.

Metal detectors

B.

Security guards

C.

RFID scanners

D.

Baggage X-ray machines

Questions # 115:

What is the difference between a hub and a switch?

Options:

A.

A hub is less likely to be used in home networks

B.

A hub can create separate broadcast domains

C.

A hub retransmits traffic to all devices, while a switch sends traffic only to the intended device

D.

A switch retransmits traffic to all devices

Questions # 116:

A practitioner needing step-by-step instructions to complete a provisioning task should consult a:

Options:

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or regulations

Questions # 117:

Faking the sender address to gain unauthorized access is known as:

Options:

A.

Phishing

B.

ARP

C.

Spoofing

D.

All

Questions # 118:

What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?

Options:

A.

Least privilege

B.

Two-person control

C.

Job rotation

D.

Separation of privileges

Questions # 119:

What kind of control is it when we add a backup firewall that takes over if the main one stops working?

Options:

A.

Clustering

B.

High availability (HA)

C.

Load balancing

D.

Component redundancy

Questions # 120:

Which is a component of a Business Continuity (BC) plan?

Options:

A.

Immediate response procedures

B.

Notification systems and call trees

C.

Management authority guidance

D.

All

Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions