Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC CC Questions and answers with ValidTests

Exam CC All Questions
Exam CC Premium Access

View all detail and faqs for the CC exam

Viewing page 6 out of 13 pages
Viewing questions 51-60 out of questions
Questions # 51:

Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information

Options:

A.

Risk Management

B.

Risk Assessment

C.

Risk Mitigation

D.

Adequate Security

Expert Solution
Questions # 52:

Which of these tool is commonly used to crack passwords

Options:

A.

Bup Suite

B.

Nslookup

C.

Wireshark

D.

John the ripper

Expert Solution
Questions # 53:

Which one of the following cryptographic algorithms does not depend upon the prime factorization problem?

Options:

A.

RSA - Rivest-Shamir-Adleman

B.

GPG - GNU Privacy Guard

C.

ECC - Elliptic curve cryptosystem

D.

PGP - Pretty Good Privacy

Expert Solution
Questions # 54:

Which Prevent crime by designing a physical environment that positively influences human behavior.

Options:

A.

DMZ

B.

Security Alarm

C.

CPTED

D.

CCTV

Expert Solution
Questions # 55:

IDS can be described in terms of what fundamental functional components?

Options:

A.

Response

B.

Information Sources

C.

Analysis

D.

All of the choices.

Expert Solution
Questions # 56:

Which of the following is a common security measure to prevent Cross Site Scripting (XSS) attacks in web applications?

Options:

A.

implementing strong password policies

B.

using a firewall to block incoming traffic

C.

validating and sanitizing user input (Correct)

D.

encrypting data during transmission

Expert Solution
Questions # 57:

Faking the sending address of a transmission to gain illegal entry into a secure system.

Options:

A.

Phishing

B.

ARP

C.

Spoofing

D.

ALL

Expert Solution
Questions # 58:

Port used in DNS

Options:

A.

53

B.

80

C.

45

D.

54

Expert Solution
Questions # 59:

Which of the following is often associated with DR planning?

Options:

A.

Checklists

B.

Antivirus

C.

firewall

D.

AII

Expert Solution
Questions # 60:

Which document serve as specifications for the implementation of policy and dictates mandatory requirements

Options:

A.

Policy

B.

Guideline

C.

Standard

D.

Procedures

Expert Solution
Viewing page 6 out of 13 pages
Viewing questions 51-60 out of questions