Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC CC Questions and answers with ValidTests

Exam CC All Questions
Exam CC Premium Access

View all detail and faqs for the CC exam

Viewing page 12 out of 13 pages
Viewing questions 111-120 out of questions
Questions # 111:

Events with a negative consequence, such as system crashes, network packet floods, unauthorized use of system privileges, defacement of a web page or execution of malicious code that destroys data.

Options:

A.

Breach

B.

Incident

C.

Adverse Event

D.

Exploit

Expert Solution
Questions # 112:

A hacker is trying to gain access to a company network which of the following scenarios would be an example of defense in depth

Options:

A.

The company relies solely on a firewall to block unauthorized access

B.

The company stores all sensitive data on a single server

C.

The hacker is required to enter a username and password

D.

None

Expert Solution
Questions # 113:

A type of malware that downloads onto a computer disguised as a legitimate program

Options:

A.

Worm

B.

Trojan

C.

virus

D.

Ransomware

Expert Solution
Questions # 114:

Which of the following is the least secure communications protocol?

Options:

A.

CHAP

B.

Ipsec

C.

PAP

D.

EAP

Expert Solution
Questions # 115:

A chief information security officer (CISO) at a large organization documented a policy that establishes the acceptable use of cloud environments for all staff. This is an example of

Options:

A.

Technical control

B.

Physical control

C.

Cloud control

D.

Management/Administrative control

Expert Solution
Questions # 116:

A set of instructions to help IT staff detect, respond to, and recover from network security incidents?

Options:

A.

BCP

B.

IRP

C.

DRP

D.

None

Expert Solution
Questions # 117:

Which type of control is used to identify that an attack has occurred or is currently occurring

Options:

A.

Preventive control

B.

Detective control

C.

Corrective control

D.

Recovery control

Expert Solution
Questions # 118:

Which version of TLS is considered to be the most secure and recommended for use?

Options:

A.

TLS 1.0

B.

TLS 1.1

C.

TLS 1.2

D.

TLS 1.3

Expert Solution
Questions # 119:

A security practitioner who needs step-by-step instructions to complete a provisioning task

Options:

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or Regulations

Expert Solution
Questions # 120:

What does Personally Identifiable Information (Pll) pertain to?

Options:

A.

Information about an individual's health status

B.

Data about an individual that could be used to identify them (Correct)

C.

Trade secrets, research, business plans and intellectual property

D.

The importance assigned to information by its owner

Expert Solution
Viewing page 12 out of 13 pages
Viewing questions 111-120 out of questions