Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the ISC certification CC Questions and answers with Dumpstech

Exam CC Premium Access

View all detail and faqs for the CC exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions
Questions # 61:

A measure of the degree to which an organization depends on information or systems to achieve its mission is called:

Options:

A.

Availability

B.

Criticality

C.

Authorization

D.

Confidentiality

Questions # 62:

Which of these tools is commonly used to crack passwords?

Options:

A.

Burp Suite

B.

Nslookup

C.

Wireshark

D.

John the Ripper

Questions # 63:

David is worried about distributed denial-of-service (DDoS) attacks against his company’s primary web application. Which option will provide the MOST resilience against large-scale DDoS attacks?

Options:

A.

Implement a CDN

B.

Increase the number of servers in the web application cluster

C.

Contract for DDoS mitigation services via the company’s IPS

D.

Increase bandwidth from one or more ISPs

Questions # 64:

Which type of database combines related records and fields into a logical tree structure?

Options:

A.

Relational

B.

Hierarchical

C.

Object-oriented

D.

Network

Questions # 65:

Example of Type 1 authentication:

Options:

A.

Password

B.

Smart card

C.

Fingerprint

D.

RSA token

Questions # 66:

Which is NOT a component of a Business Continuity (BC) plan?

Options:

A.

Immediate response procedures

B.

Notification systems

C.

Management authority guidance

D.

Management

Questions # 67:

What is meant by non-repudiation?

Options:

A.

If a user does something, they can't later claim that they didn't do it.

B.

Controls to protect the organization's reputation from harm due to inappropriate social media postings by employees, even if on their private accounts and personal time.

C.

It is part of the rules set by administrative controls.

D.

It is a security feature that prevents session replay attacks.

Questions # 68:

Why is a “Red Book” important in Business Continuity Planning?

Options:

A.

To have a hard copy for easy access

B.

Easy to carry and transfer

C.

When disasters disable power and electronic access

D.

All

Questions # 69:

Which is related to standards?

Options:

A.

NIST

B.

GDPR

C.

HIPAA

D.

All

Questions # 70:

John joined the ISC2 organization. His manager asked him to check the authentication controls in a security module. What would John use to ensure a certain control is working as he expects it to?

Options:

A.

Security testing

B.

Security assessment

C.

Security audit

D.

Security walkthrough

Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions