Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the ISC certification CC Questions and answers with Dumpstech

Exam CC Premium Access

View all detail and faqs for the CC exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which principle aims primarily at fraud detection?

Options:

A.

Defense in depth

B.

Least privilege

C.

Separation of duties

D.

Privileged account

Questions # 22:

Removing the belief that a network has any trusted space and enforcing security at the most granular level is known as:

Options:

A.

Zero Trust

B.

Defense in Depth

C.

Least Privilege

D.

All

Questions # 23:

IDS can be described in terms of what fundamental functional components?

Options:

A.

Response

B.

Information sources

C.

Analysis

D.

All of the choices

Questions # 24:

Which is the first step in the risk management process?

Options:

A.

Risk response

B.

Risk mitigation

C.

Risk identification

D.

Risk assessment

Questions # 25:

In cybersecurity, typical threat actors include:

Options:

A.

Insiders (intentional or accidental)

B.

External individuals or groups

C.

Technology (bots, automation, AI)

D.

All

Questions # 26:

What is the primary purpose of a honeytoken in cybersecurity?

Options:

A.

To lure and detect attackers

B.

To encrypt sensitive data

C.

To enhance network performance

D.

To manage user access

Questions # 27:

Often offered by third-party organizations and covering advisory or compliance objectives:

Options:

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or Regulations

Questions # 28:

The prevention of authorized access to resources or delaying time-critical operations is known as:

Options:

A.

DDoS

B.

Authorization

C.

Authentication

D.

Availability

Questions # 29:

Which element of the security policy framework includes recommendations that are NOT binding?

Options:

A.

Procedures

B.

Guidelines

C.

Standards

D.

Policies

Questions # 30:

Example of a technical control:

Options:

A.

Security guard

B.

GPS installed in a vehicle to track location

C.

Door lock

D.

None

Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions