Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the ISC certification CC Questions and answers with Dumpstech

Exam CC Premium Access

View all detail and faqs for the CC exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions
Questions # 11:

You experienced a power outage that disrupted access to your data center. What type of security concern occurred?

Options:

A.

Availability

B.

Confidentiality

C.

Non-repudiation

D.

Integrity

Questions # 12:

What is an incident in cybersecurity?

Options:

A.

Any event

B.

Unauthorized access

C.

An exploit

D.

An event that jeopardizes CIA

Questions # 13:

A collection of actions that must be followed to complete a task or process in accordance with a set of rules is known as:

Options:

A.

Policy

B.

Procedure

C.

Law

D.

Standard

Questions # 14:

A curated knowledge base modeling adversary behavior across attack phases is:

Options:

A.

MITRE ATTandCK

B.

CVE

C.

RMF

D.

Security Management

Questions # 15:

A measure of an organization’s baseline security performance is a:

Options:

A.

Security assessment

B.

Security audit

C.

Security benchmark

D.

Security management

Questions # 16:

An unknown person obtains unauthorized access to the company file system. This is an example of:

Options:

A.

Intrusion

B.

Breach

C.

Exploit

D.

Incident

Questions # 17:

A newly enforced BYOD policy represents which control type?

Options:

A.

Physical control

B.

Logical control

C.

Administrative control

D.

Technical control

Questions # 18:

Which one of the following cryptographic algorithms does NOT depend upon the prime factorization problem?

Options:

A.

RSA – Rivest-Shamir-Adleman

B.

GPG – GNU Privacy Guard

C.

ECC – Elliptic Curve Cryptosystem

D.

PGP – Pretty Good Privacy

Questions # 19:

Embedded systems and network-enabled devices that communicate with the Internet are:

Options:

A.

Endpoints

B.

Nodes

C.

IoT

D.

Routers

Questions # 20:

Which of the following is often associated with Disaster Recovery planning?

Options:

A.

Checklists

B.

Antivirus

C.

Firewalls

D.

All

Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions