Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC CC Questions and answers with ValidTests

Exam CC All Questions
Exam CC Premium Access

View all detail and faqs for the CC exam

Viewing page 2 out of 13 pages
Viewing questions 11-20 out of questions
Questions # 11:

Is defined as the process of identifying, estimating and prioritizing risks

Options:

A.

Risk Assessment

B.

Risk Treatment

C.

Risk mitigation

D.

Risk Management

Expert Solution
Questions # 12:

What is knowledge based authentication

Options:

A.

Authentication based on a passphrase or secret code

B.

Autheication based on a token or memory card

C.

Authentication based on biometrics or measurble charestrisirtcs

D.

Authencication based on something you do

Expert Solution
Questions # 13:

A company performs an analysis of its information systems requirements functions and interdependences in order to prioritize contingency requirement. What is this process called?

Options:

A.

BCP

B.

DRP

C.

IRP

D.

BIA

Expert Solution
Questions # 14:

What federal law requires the use of vulnerability scanning on information systems operated by federal government agencies?

Options:

A.

FISMA

B.

HIPAA

C.

GLBA

D.

FERPA

Expert Solution
Questions # 15:

The highest-level governance documents in an organization, usually approved and issued by management, usually to support a compliance initiative

Options:

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or Regulations

Expert Solution
Questions # 16:

Which is an approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network.

Options:

A.

VLAN

B.

SDN

C.

VPN

D.

SAN

Expert Solution
Questions # 17:

Which is an authorized simulated attack performed on a computer system to evaluate its security.

Options:

A.

Penetration test

B.

Security Testing

C.

Automated Testing

D.

Regression Testing

Expert Solution
Questions # 18:

What is the priority of incident response in the context of incident management

Options:

A.

Protect the organization mission and objectives

B.

Reduce the impact of the incident

C.

Protect life health and safety

D.

Resume interrupted operations as soon as possible

Expert Solution
Questions # 19:

True or False? The IT department is responsible for creating the organization's business continuity plan

Options:

A.

True

B.

False

Expert Solution
Questions # 20:

Which of the following is unlikely to be a member of the disaster recovery team

Options:

A.

Executive Management

B.

Public Relations

C.

Billing Clerk

D.

IT personnel

Expert Solution
Viewing page 2 out of 13 pages
Viewing questions 11-20 out of questions