Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ISC CC Questions and answers with ValidTests

Exam CC All Questions
Exam CC Premium Access

View all detail and faqs for the CC exam

Viewing page 1 out of 13 pages
Viewing questions 1-10 out of questions
Questions # 1:

Shaun is planning to protect their data in all states(Rest, Motion, use), defending against data leakage. What would be the BEST solution to implement?

Options:

A.

End to end encryption.

B.

Hashing

C.

DLP

D.

Threat Modeling

Expert Solution
Questions # 2:

Which of the following best describes the puposes of a business impact analysis?

Options:

A.

To document a predetermined set of instructions or procedures for restoring IT and communications services after a disruption

B.

To mitigate security violation and ensure that business operation can continue during a contigency

C.

To provide a high level overview of the disaster recovery plan

D.

To analyze an information systems requirements and functions in order to determine system contingency priorities

Expert Solution
Questions # 3:

A backup is which type for security control

Options:

A.

Preventive

B.

Deterrent

C.

Recovery

D.

Corrective

Expert Solution
Questions # 4:

A scammer will attempt to make a malicious website look exactly like a legitimate one that the victim knows and trusts

Options:

A.

DOS

B.

Virus

C.

Spoofing

D.

Phishing

Expert Solution
Questions # 5:

Common network device used to connect networks?

Options:

A.

Server

B.

Endpoint

C.

Router

D.

Switch

Expert Solution
Questions # 6:

Which TLS extension is used to optimize the TLS handshake process by reducing the number of round trips between the client and server?

Options:

A.

TLS Renegotiation

B.

TLS Heartbeat

C.

TLS Session Resumption

D.

TLS FastTrack

Expert Solution
Questions # 7:

The requirement of both the manager and the accountant to approve the transaction fund exceeding $ 50000. Which security concept best suits this

Options:

A.

MAC

B.

Defence in Depth

C.

Two Person integrity

D.

Principle of least privilege

Expert Solution
Questions # 8:

A/hich layer of the OSI Layer model is the target of a buffer overflow attack

Options:

A.

Layer 7

B.

Layer 3

C.

Layer 5

D.

Layer 4

Expert Solution
Questions # 9:

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which one of the following controls would BEST achieve his objective?

Options:

A.

URL Filter

B.

IP Address Block

C.

DLP Solution

D.

IPS Solution

Expert Solution
Questions # 10:

What is the process of verifying a users identity called?

Options:

A.

Confidentiality

B.

Autentication

C.

Authorization

D.

Identification

Expert Solution
Viewing page 1 out of 13 pages
Viewing questions 1-10 out of questions