Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ISC certification CC Questions and answers with Dumpstech

Exam CC Premium Access

View all detail and faqs for the CC exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions
Questions # 1:

An authorized simulated attack to evaluate security is called:

Options:

A.

Penetration test

B.

Security testing

C.

Automated testing

D.

Regression testing

Questions # 2:

A set of rules that everyone must comply with and that usually carry monetary penalties for noncompliance are:

Options:

A.

Standards

B.

Policies

C.

Procedures

D.

Laws or regulations

Questions # 3:

255.255.255.0 represents:

Options:

A.

Broadcast address

B.

Unicast address

C.

Subnet mask

D.

Global address

Questions # 4:

Walmart has a large e-commerce presence worldwide. Which solution would ensure the LOWEST possible latency for customers using their services?

Options:

A.

CDN

B.

SaaS

C.

Load balancing

D.

Decentralized data centers

Questions # 5:

What is the shortened form of

2001:0db8:0000:0000:0000:ffff:0000:0001?

Options:

A.

2001:db8::ffff:0:1

B.

2001:db8:0000:ffff:0:1

C.

2001:db80::ffff:0000:1

D.

2001:db8::ffff:0000:0001

Questions # 6:

Token Ring operates at which OSI layer?

Options:

A.

Application

B.

Network

C.

Transport

D.

Physical

Questions # 7:

Which technology should be implemented to increase the work effort required for buffer overflow attacks?

Options:

A.

Address Space Layout Randomization

B.

Memory induction application

C.

Input memory isolation

D.

Read-only memory integrity checks

Questions # 8:

Why is the recovery of IT often crucial to the recovery and sustainment of business operations?

Options:

A.

IT is not important to business operations

B.

IT is often the cause of disasters

C.

IT can be easily recovered without impact

D.

Many businesses rely heavily on IT for operations

Questions # 9:

XenServer, LVM, Hyper-V, and ESXi are:

Options:

A.

Type 2 hypervisors

B.

Type 1 hypervisors

C.

Both

D.

None

Questions # 10:

Which layer provides services directly to the user?

Options:

A.

Application Layer

B.

Session Layer

C.

Presentation Layer

D.

Physical Layer

Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions