Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the ISC certification CC Questions and answers with Dumpstech

Exam CC Premium Access

View all detail and faqs for the CC exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions
Questions # 41:

Firewalls operate at which OSI layers?

Options:

A.

Layer 3

B.

Layer 4

C.

Layer 7

D.

All

Questions # 42:

Restoring IT and communications after a disruption is the goal of:

Options:

A.

BCP

B.

IRP

C.

DRP

D.

None

Questions # 43:

A security event in which an intruder gains or attempts unauthorized access to a system is called:

Options:

A.

Intrusion

B.

Exploit

C.

Threat

D.

Attack

Questions # 44:

Which physical controls protect against electromagnetic eavesdropping?

Options:

A.

EMI shielding

B.

Screening rooms

C.

White noise generators

D.

All

Questions # 45:

What doescriticalityrepresent?

Options:

A.

Consultation needs

B.

The importance of data or systems to mission success

C.

Availability requirements

D.

All of the above

Questions # 46:

An event that jeopardizes confidentiality, integrity, or availability is called:

Options:

A.

Breach

B.

Event

C.

Incident

D.

Exploit

Questions # 47:

Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?

Options:

A.

Non-repudiation

B.

Integrity

C.

Availability

D.

Confidentiality

Questions # 48:

Flooding a server with traffic to make services unavailable is called:

Options:

A.

Phishing

B.

Virus

C.

Spoofing

D.

DDoS

Questions # 49:

Which phase of the access control process (AAA) does a user prove his/her identity?

Options:

A.

Authentication

B.

Authorization

C.

Identification

D.

Accounting

Questions # 50:

Which is related to privacy?

Options:

A.

GDPR

B.

FIPS

C.

MOU

D.

All

Viewing page 5 out of 12 pages
Viewing questions 41-50 out of questions