Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the ISC certification CC Questions and answers with Dumpstech

Exam CC Premium Access

View all detail and faqs for the CC exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions
Questions # 51:

A common network device used to filter traffic?

Options:

A.

Server

B.

Endpoint

C.

Ethernet

D.

Firewall

Questions # 52:

Which of these components is very likely to be instrumental to any disaster recovery (DR) effort?

Options:

A.

Routers

B.

Laptops

C.

Firewalls

D.

Backups

Questions # 53:

DNS operates at which OSI layer?

Options:

A.

Physical

B.

Network

C.

Application

D.

Data Link

Questions # 54:

What is the primary purpose of a firewall?

Options:

A.

Encrypt data transmissions

B.

Prevent unauthorized access

C.

Monitor network traffic

D.

Backup critical data

Questions # 55:

Exhibit.

Question # 55

Question # 55

What kind of vulnerability is typically not identifiable through a standard vulnerability assessment?

Options:

A.

File permissions

B.

Buffer overflow

C.

Zero-day vulnerability

D.

Cross-site scripting

Questions # 56:

Difference between sniffing and spoofing:

Options:

A.

Sniffing intercepts traffic; spoofing disguises identity

B.

Snooping intercepts traffic; sniffing disguises identity

C.

Both are the same

D.

Sniffing is not a threat

Questions # 57:

Example of a deterrent control:

Options:

A.

CCTV

B.

BCP

C.

DRP

D.

IRP

Questions # 58:

An unusual occurrence in a system or network is best described as:

Options:

A.

Breach

B.

Exploit

C.

Event

D.

Intrusion

Questions # 59:

Which can be considered a fingerprint of a file or message?

Options:

A.

Hashing

B.

Encryption

C.

Decryption

D.

Encoding

Questions # 60:

Why is security training important?

Options:

A.

Because it fulfills regulatory requirements

B.

Because it helps people perform job duties more efficiently

C.

Because it reduces the risk of attacks such as social engineering

D.

All

Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions