Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC CC Questions and answers with ValidTests

Exam CC All Questions
Exam CC Premium Access

View all detail and faqs for the CC exam

Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions
Questions # 71:

What is the first component the new security engineer should learn about in the incident response plan?

Options:

A.

Detection and analysis

B.

Preparation

C.

Containment

D.

Eradication

Expert Solution
Questions # 72:

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called______

Options:

A.

Malware

B.

Zero-day

C.

Event

D.

Attack

Expert Solution
Questions # 73:

A company experiences a power outage that causes a major disruption in its operations. What type of plan will help the company sustain operations?

Options:

A.

DRP

B.

IRP

C.

BCP

D.

ALL

Expert Solution
Questions # 74:

Example of Dynamic authorization

Options:

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

Expert Solution
Questions # 75:

A hacker gains access to an organization system without authorization and steal confidential data. What term best describes this ?

Options:

A.

Event

B.

Breach

C.

Intrusion

D.

Exploit

Expert Solution
Questions # 76:

The harmonization of automated computing tasks, providing a consolidated and reusable workflow

Options:

A.

Cloud Orchestration

B.

Cloud Manager

C.

Cloud broker

D.

Cloud Controller

Expert Solution
Questions # 77:

Which is related to Standard

Options:

A.

NIST

B.

GDPR

C.

HIPAA

D.

ALL

Expert Solution
Questions # 78:

Which is the first step in the risk management process

Options:

A.

Risk response

B.

Risk mitigation

C.

Risk identification

D.

Risk assessment

Expert Solution
Questions # 79:

Actions, processes and tools for ensuring an organization can continue critical operations during a contingency.

Options:

A.

BC

B.

DR

C.

IR

D.

AII

Expert Solution
Questions # 80:

A company security team detected a cyber attack against it information systems and activates a set of procedures to mitigate the attack., What type of plan is this?

Options:

A.

Business continuty plan

B.

Incident response plan

C.

Disaster recvoery plan

D.

Security operation plan

Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions