Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC CC Questions and answers with ValidTests

Exam CC All Questions
Exam CC Premium Access

View all detail and faqs for the CC exam

Viewing page 9 out of 13 pages
Viewing questions 81-90 out of questions
Questions # 81:

What is the primary goal of network segmentation in cybersecurity?

Options:

A.

To increase network speed

B.

To isolate and protect critical assets

C.

To centralize data storage

D.

To expand the network's coverage

Expert Solution
Questions # 82:

A organization's security system which involves in preventing, detecting, analyzing, and responding to cybersecurity incidents.

Options:

A.

Business continuity team

B.

Disaster recovery team

C.

Incident response team

D.

Security operations center

Expert Solution
Questions # 83:

A Hacker launched a specific attack to exploit a known system vulnerability. What term best describes this situation?

Options:

A.

Breach

B.

Event

C.

Exploit

D.

Intrusion

Expert Solution
Questions # 84:

Load balancing safe guard which CIA triad

Options:

A.

Confidentiality

B.

Availablity

C.

Integrity

D.

All

Expert Solution
Questions # 85:

Which is the SSH port

Options:

A.

21

B.

23

C.

24

D.

22

Expert Solution
Questions # 86:

System capabilities designed to detect and prevent the unauthorized use and transmission of information.

Options:

A.

SOC

B.

SIEM solutions

C.

Data Loss Prevention

D.

Crytography

Expert Solution
Questions # 87:

A company wants to ensure that its employees can evacuate the building in case of an emergency which physical control is best suited for this scenario

Options:

A.

Fire Alarms

B.

Exit signs

C.

Emergency lighting

D.

Emergency exit doors

Expert Solution
Questions # 88:

Natalia is concerned that users on her network may be storing sensitive information, such as social security numbers, on their hard drives without proper authorization or security controls. What 3rd -party security service can she implement to best detect this activity?

Options:

A.

IDS - Intrusion Detection System

B.

IPS - Intrusion Prevention System

C.

DLP - Data Loss Protection

D.

TLS - Transport Layer Security

Expert Solution
Questions # 89:

255.255.255.0 Address represents

Options:

A.

Broadcast

B.

Unicast

C.

Subnet mask

D.

Global Address

Expert Solution
Questions # 90:

Dani is an ISC2 member and an employee of New Corporation. One of Dani's colleagues offers to share a file that contains an illicit copy of a newly released movie. What should Dani do

Options:

A.

Inform ISC2

B.

Inform law enforcement

C.

Accept the movie

D.

Refuse to accept

Expert Solution
Viewing page 9 out of 13 pages
Viewing questions 81-90 out of questions