Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC CC Questions and answers with ValidTests

Exam CC All Questions
Exam CC Premium Access

View all detail and faqs for the CC exam

Viewing page 4 out of 13 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which type of malware encrypts a users file system and demands payment in exchange of decrypting key

Options:

A.

Worm

B.

Trojan

C.

virus

D.

Ransomware

Expert Solution
Questions # 32:

Communication between end systems is encrypted using a key, often known as________?

Options:

A.

Temporary Key

B.

Section Key

C.

Public Key

D.

Session Key

Expert Solution
Questions # 33:

which is the short form of IPv6 address 2001:0db8:0000:0000:0000:ffff:0000:0001

Options:

A.

2001:db8::ffff:0:1

B.

2001:db8:0000:ffff:0:1

C.

2001:db80::ffff:0000:1

D.

2001:db8::ffff:0000:0001

Expert Solution
Questions # 34:

Which of the following is a systematic approach to protecting against cyber threats that involves a continuous cycle of identifying, assessing and prioritizing risks and implementing measures to reduce or eliminate those risks?

Options:

A.

Security Assessment

B.

Incident response

C.

Peneteration testing

D.

Risk Management

Expert Solution
Questions # 35:

What goal of security is enhanced by a strong business continuity program?

Options:

A.

non-repudiation

B.

Availability

C.

Confidentiality

D.

Integrity

Expert Solution
Questions # 36:

A structured approach used to oversee and manage risk for an enterprise

Options:

A.

Risk Assessment

B.

Risk threshold

C.

Risk Management Framework

D.

Risk appetite

Expert Solution
Questions # 37:

Example of Deterrent controls

Options:

A.

CCTV

B.

BCP

C.

DRP

D.

IRP

Expert Solution
Questions # 38:

Organization experiences a security event that does not affect the confidentiality integrity and availability of its information system. What term BEST describes this situation?

Options:

A.

Exploit

B.

Breach

C.

Incident

D.

Event

Expert Solution
Questions # 39:

_______are virtual separations within a switch and are used mainly to limit broadcast traffic

Options:

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Expert Solution
Questions # 40:

Port forwarding is also known as

Options:

A.

Port mapping

B.

Tunneling

C.

Punch through

D.

ALL

Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 31-40 out of questions