Month End Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CC CC - Certified in Cybersecurity Questions and Answers

Questions 4

are events that may indicate that an organization's systems or data have been compromised or that measures put in place to protect them have failed

Options:

A.

Exploit

B.

Security Incident

C.

Threat

D.

Rreach

Buy Now
Questions 5

6 Which access control method uses attributes and rules to define access policies that are evaluate by a central Policy Decision Point (PDP)

Options:

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

Buy Now
Questions 6

A backup is which type for security control

Options:

A.

Preventive

B.

Deterrent

C.

Recovery

D.

Corrective

Buy Now
Questions 7

Access control used in in high-security situations such as military and government organizations.

Options:

A.

DAC

B.

MAC

C.

RBAC

D.

ABAC

Buy Now
Questions 8

Which of the following documents contains elements that are NOT mandatory

Options:

A.

Procedures

B.

Policies

C.

Regulations

D.

Guidelines

Buy Now
Questions 9

provide integrity services that allow a recipient to verify that a message has not been altered.

Options:

A.

Hashing

B.

encryption

C.

decryption

D.

encoding

Buy Now
Questions 10

Works via encapsulation and wrapping a packet inside another packet.

Options:

A.

Network segmentation

B.

Load balancing

C.

Tunnelling

D.

Data encryption

Buy Now
Questions 11

What is knowledge based authentication

Options:

A.

Authentication based on a passphrase or secret code

B.

Autheication based on a token or memory card

C.

Authentication based on biometrics or measurble charestrisirtcs

D.

Authencication based on something you do

Buy Now
Questions 12

Which access control model grants permission based on the sensitivity of the data and the user job functions

Options:

A.

DAC

B.

RBAC

C.

MAC

D.

RUBAC

Buy Now
Questions 13

Which of the following is the least secure communications protocol?

Options:

A.

CHAP

B.

Ipsec

C.

PAP

D.

EAP

Buy Now
Questions 14

Which of the following is not a protocol of the OSI layer 3

Options:

A.

IGMP

B.

IP

C.

ICMP

D.

SSH

Buy Now
Questions 15

255.255.255.0 Address represents

Options:

A.

Broadcast

B.

Unicast

C.

Subnet mask

D.

Global Address

Buy Now
Questions 16

What kind of control is, when we add a backup firewall that takes over if the main one stops working?

Options:

A.

Clustering

B.

High availability(HA)

C.

Load balancing

D.

Component redundancy

Buy Now
Questions 17

Set of rules that everyone must comply with and usually carry monetary penalties for noncompliance

Options:

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or Regulations

Buy Now
Questions 18

In which of the following phases of an incident recovery plan the incident responses prioritized

Options:

A.

Post incident activity

B.

Containment eradication and recovery

C.

Detection and analysis

D.

Preparation

Buy Now
Questions 19

Which is the SSH port

Options:

A.

21

B.

23

C.

24

D.

22

Buy Now
Questions 20

Communication between end systems is encrypted using a key, often known as________?

Options:

A.

Temporary Key

B.

Section Key

C.

Public Key

D.

Session Key

Buy Now
Questions 21

Mark works in the security office. During research, Mark learns that a configuration change could better protect the organization's IT environment. Mark makes a proposal for this change, but the change cannot be implemented until it is approved, tested, and then cleared for deployment by the Change Control Board. This is an example of__________

Options:

A.

Holistic security

B.

Defense in depth

C.

Threat intelligence

D.

Segregation of duties

Buy Now
Questions 22

Why is the recovery of IT often crucial to the recovery and sustainment of business operations

Options:

A.

IT is not important to business operation

B.

IT often the cause for the disaster

C.

IT can be easily recovers without any impact of business operations

D.

Many business rely heavily on IT for their operations

Buy Now
Questions 23

Four main components of Incident Response are

Options:

A.

Preparation, Detection and Analysis, Containment, Eradication a

B.

Preparation, Detection, Analysis and Containment

C.

Detection, Analysis, Containment, Eradication and Recovery

D.

AII

Buy Now
Questions 24

When the ISC2 Mail server sends mail to other mail servers it becomes —?

Options:

A.

SMTP Server

B.

SMTP Peer

C.

SMTP Master

D.

SMTP Client

Buy Now
Questions 25

A Hacker launched a specific attack to exploit a known system vulnerability. What term best describes this situation?

Options:

A.

Breach

B.

Event

C.

Exploit

D.

Intrusion

Buy Now
Questions 26

Exhibit.

CC Question 26

How many keys would be required to support 50 users in an asymmetric cryptography system?

Options:

A.

100

B.

200

C.

50

D.

1225

Buy Now
Questions 27

Which protocol would be most suitable to fulfill the secure communication requirements between clients and the server for a company deploying a new application?

Options:

A.

FTP

B.

HTTP

C.

HTTPS

D.

SMTP

Buy Now
Questions 28

Which one of the following cryptographic algorithms does not depend upon the prime factorization problem?

Options:

A.

RSA - Rivest-Shamir-Adleman

B.

GPG - GNU Privacy Guard

C.

ECC - Elliptic curve cryptosystem

D.

PGP - Pretty Good Privacy

Buy Now
Questions 29

What is the BEST defense against dumpster diving attacks?

Options:

A.

Anti-malware software

B.

Clean desk policy

C.

Data loss prevention tools

D.

Shredding

Buy Now
Questions 30

Example of Technical controls

Options:

A.

Security Guard

B.

GPS installed in vehicle to track location

C.

Door Lock

D.

None

Buy Now
Questions 31

Which of the following principles aims primarily at fraud detection

Options:

A.

Defense in depth

B.

Least privilege

C.

Separation of duties

D.

Privileged account

Buy Now
Questions 32

What is the primary purpose of a firewall in network security?

Options:

A.

Encrypt data transmissions

B.

Prevent unauthorized access

C.

Monitor network traffic

D.

Backup critical data

Buy Now
Questions 33

Which term describes a communication tunnel that provides point-to-point transmission of both authentication and data traffic over an untrusted network?

Options:

A.

Zero Trust

B.

DMZ

C.

VPN

D.

None of the Above

Buy Now
Questions 34

Natalia is concerned about the security of his organization's domain name records and would like to adopt a technology that ensures their authenticity by adding digital signatures. Select the MOST appropriate technology to use?

Options:

A.

DNSSIGN

B.

DNSSEC

C.

CERTDNS

D.

DNS2

Buy Now
Questions 35

What is the term used to denote the inherent set of privileges assigned to a user upon the creation of a new account?

Options:

A.

Aggregation

B.

Transitivity

C.

Baseline

D.

Entitlement

Buy Now
Questions 36

Which layer provides the services to user?

Options:

A.

Application layers

B.

Session Layers

C.

Presentation Layer

D.

Physical Layer

Buy Now
Questions 37

Token Ring used in which OSI Layer

Options:

A.

Application

B.

Network

C.

Transport

D.

Physical

Buy Now
Questions 38

Networks are often micro segmented networks, with firewalls at nearly every connecting point

Options:

A.

DMZ

B.

VPN

C.

VLAN

D.

Zero Trust

Buy Now
Questions 39

Why is security training important?

Options:

A.

Because it fulfills regulatory requirements.

B.

Because it helps people to perform their job duties more efficiently.

C.

Because it reduces the risk of certain types of attacks, like social engineering.

D.

AII

Buy Now
Questions 40

What is the importance of non-repudiation in todays world of ecommerce

Options:

A.

It ensures that people are not held responsible for transaction that did not conduct

B.

It ensures that people are held responsible for transactions they conducted

C.

It ensures that transactions are not conducted online

D.

It ensures that transactions are conducted online

Buy Now
Questions 41

Raj is considering a physical deterrent control to dissuade unauthorized people from entering the organization's property. Which of the following would serve this purpose?

Options:

A.

A wall

B.

Razor tape

C.

A sign

D.

A hidden camera

Buy Now
Questions 42

COVID-19 is one of the perfect example of a situation, where a________plan is

enacted to sustain the business

Options:

A.

IRP

B.

DRP

C.

BCP

D.

ALL

Buy Now
Questions 43

A organization's security system which involves in preventing, detecting, analyzing, and responding to cybersecurity incidents.

Options:

A.

Business continuity team

B.

Disaster recovery team

C.

Incident response team

D.

Security operations center

Buy Now
Questions 44

Which of these activities is often associated with DR efforts?

Options:

A.

Running anti-malware solutions

B.

Scanning the IT environment for vulnerabilities

C.

Zero-day exploits

D.

Employees returning to the primary production location

Buy Now
Questions 45

Mark has purchased a MAC LAPTOP. He is scared of losing his screen and planning to buy an insurance policy. So, which risk management strategy is?

Options:

A.

Risk acceptance

B.

Risk deterrence

C.

Risk transference

D.

Risk mitigation

Buy Now
Questions 46

TCP and UDP reside at which layer of the osi model?

Options:

A.

Session

B.

Transport

C.

Data link

D.

Presentation

Buy Now
Questions 47

Which version of TLS is considered to be the most secure and recommended for use?

Options:

A.

TLS 1.0

B.

TLS 1.1

C.

TLS 1.2

D.

TLS 1.3

Buy Now
Questions 48

Which of the following best describes the puposes of a business impact analysis?

Options:

A.

To document a predetermined set of instructions or procedures for restoring IT and communications services after a disruption

B.

To mitigate security violation and ensure that business operation can continue during a contigency

C.

To provide a high level overview of the disaster recovery plan

D.

To analyze an information systems requirements and functions in order to determine system contingency priorities

Buy Now
Questions 49

A hacker gains access to an organization system without authorization and steal confidential data. What term best describes this ?

Options:

A.

Event

B.

Breach

C.

Intrusion

D.

Exploit

Buy Now
Questions 50

Why Red book is important in BCP

Options:

A.

To have hard copy for easy access

B.

Easy to carry and transfer

C.

A hurricane hits, the power is out and all the facilities are compromised and there is no access to electronic backups

D.

AII

Buy Now
Questions 51

Permitting authorized access to information while protecting it from improper disclosure

Options:

A.

Integrity

B.

Confidentiality

C.

Availability

D.

ALL

Buy Now
Questions 52

A company needs to protect its confidential data from unauthorized access which logical control is best suited for this scenario

Options:

A.

Encryption

B.

Firewall

C.

Antivirus

D.

Hashing

Buy Now
Questions 53

DevOps team has updated the application source code, Tom has discovered that many unauthorized changes have been made. What is the BEST control Tom can implement to prevent a recurrence of this problem?

Options:

A.

Backup

B.

File labels

C.

Security audit

D.

Hashing

Buy Now
Questions 54

What is the primary factor in the reliability of information and system

Options:

A.

Authenticity

B.

Confidentiality

C.

Integrity

D.

Availability

Buy Now
Questions 55

After an Earthquake disrupting business operations, which documents contains the reactive procedures required to return business to normal operations

Options:

A.

The Business Impact Analysis

B.

The Business Continuity Plan

C.

The Disaster Recovery plan

D.

The Business Impact Plan

Buy Now
Questions 56

Devid's team recently implemented a new system that gathers information from a variety of different log sources, analyses that information, and then triggers automated playbooks in response to security events, what term BEST describes this technology?

Options:

A.

SIEM

B.

Log Repository

C.

IPS

D.

SOAR

Buy Now
Questions 57

The purpose of risk identification:

Options:

A.

Employees at all levels of the organization are responsible for identifying risk.

B.

Identify risk to communicate it clearly.

C.

Identify risk to protect against it.

D.

ALL

Buy Now
Questions 58

Measure of the extent to which an entity is threatened by a potential circumstance or event and likelihood of occurrence

Options:

A.

Impact

B.

Risk

C.

Threat

D.

Threat Vector

Buy Now
Questions 59

An employee unintentionally shares confidential information with an unauthorized party. What term best describes this situation?

Options:

A.

Event

B.

Exploit

C.

Intrusion

D.

Breach

Buy Now
Questions 60

What are the primary responsibilities of a computer incident response team (CIRT) during an incident?

Options:

A.

To determine the difference between minor and major incident

B.

To troubleshoot network and system issues

C.

To provide medical assistance at accident scenes

D.

To asses the amount and scope of damage caused by the incident

Buy Now
Questions 61

What is a type of system architecture where a single instance can serve multiple distinct user groups.

Options:

A.

Mutli-threading

B.

Multi-processing

C.

Multitenancy

D.

Multi-cloud

Buy Now
Questions 62

Also known as a virtual machine monitor or VMM, is software that creates and runs virtual machines (VMs)

Options:

A.

Hypervisor

B.

Simulation

C.

Emulation

D.

Cloud Controller

Buy Now
Questions 63

The documentation of a predetermined set of instructions or procedures to detect, respond to andlimit consequences of a malicious cyberattack against an organization's information systems(s).

Options:

A.

IR

B.

IRP

C.

BCP

D.

DRP

Buy Now
Questions 64

The primary goal of a risk assessment

Options:

A.

Avoid Risk

B.

Estimate and Prioritize Risk

C.

Ignore risk

D.

Evaluate the Impact

Buy Now
Questions 65

Often offered by third-party organizations and cover specific

advisory or compliance objectives.

Options:

A.

Standard

B.

Policy

C Procedure

C.

Laws or Regulations

Buy Now
Questions 66

Which encryption type used in HTTPS communication

Options:

A.

Symentric

B.

Assymentric

C.

None

D.

Both A and B

Buy Now
Questions 67

System capabilities designed to detect and prevent the unauthorized use and transmission of information.

Options:

A.

SOC

B.

SIEM solutions

C.

Data Loss Prevention

D.

Crytography

Buy Now
Questions 68

Which is the first step in the risk management process

Options:

A.

Risk response

B.

Risk mitigation

C.

Risk identification

D.

Risk assessment

Buy Now
Questions 69

The requirement of both the manager and the accountant to approve the transaction fund exceeding $ 50000. Which security concept best suits this

Options:

A.

MAC

B.

Defence in Depth

C.

Two Person integrity

D.

Principle of least privilege

Buy Now
Questions 70

Mark is configuring an automated data transfer between two hosts and is choosing an authentication technique for one host to connect to the other host. What approach would be best-suited for this scenario?

Options:

A.

Biometric

B.

Smart Card

C.

SSH Key

D.

Hard Coded Password

Buy Now
Questions 71

The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.)

Options:

A.

DDOS

B.

Authetication

C.

Authentication

D.

Availablity

Buy Now
Questions 72

What is meant by non-repudiation?

Options:

A.

If a user does something, they can't later claim that they didn't do it.

B.

Controls to protect the organization's reputation from harm due to inappropriate social media postings by employees, even if on their private accounts and personal time.

C.

It is part of the rules set by administrative controls.

D.

It is a security feature that prevents session replay attacks.

Buy Now
Questions 73

A security event, or combination of security events, that constitutes a secu incident in which an intruder gains, or attempts to gain, access to a system or system resource without authorization

Options:

A.

Intrusion

B.

Exploit

C.

Threat

D.

Attack

Buy Now
Questions 74

What is the primary goal of a risk management process in cybersecurity?

Options:

A.

to eliminate all cybersecurity risks

B.

to transfer all cybersecurity risks to a third party

C.

to identify, assess, and mitigate cybersecurity risks to an acceptable level (Correct)

D.

to ignore cybersecurity risks and focus on incident response

Buy Now
Questions 75

Which type of control is used to minimize the impact of an attack and to restore normal operations as quick as possible

Options:

A.

Compensatory Control

B.

Corrective Control

C.

Recovery control

D.

Detective Control

Buy Now
Questions 76

Can be considered to be a fingerprint of the file or message

Options:

A.

Hashing .

B.

encryption

C.

decryption

D.

encoding

Buy Now
Questions 77

A set of instructions to help IT staff detect, respond to, and recover from network security incidents?

Options:

A.

BCP

B.

IRP

C.

DRP

D.

None

Buy Now
Questions 78

What is an IP address

Options:

A.

A physical address used to connect multiple devices in a network

B.

An address that denotes the vendor or manufacturer of the physical network interface

C.

A Logical address associated with a unique network interface within the network

D.

An Address that represents the network interface within the network

Buy Now
Questions 79

What is IPSEC reply attack

Options:

A.

An attack where an attacker modifies packets in transit

B.

An attack where an attacker eavesdrops on network traffic

C.

An attack where an attacker overloads a network with traffic

D.

An attack where an attacker attempts to inject packets in an existing sessio

Buy Now
Questions 80

The method of distributing network traffic equally across a pool of resources that support an application

Options:

A.

Vlan

B.

DNS

C.

VPN

D.

Load Balancing

Buy Now
Questions 81

Devid's team recently implemented a new system that gathers information from a variety of different log sources, analyses that information, and then triggers automated playbooks in response to security events, what term BEST describes this technology?

Options:

A.

SIEM

B.

Log Repository

C.

IPS

D.

SOAR

Buy Now
Questions 82

Which Prevent crime by designing a physical environment that positively influences human behavior.

Options:

A.

DMZ

B.

Security Alarm

C.

CPTED

D.

CCTV

Buy Now
Questions 83

Which type of control is used to restore systems or processes to their normal state after an attack has occurred

Options:

A.

Compensatory Control

B.

Recovery Control

C.

Detective Control

D.

Corrective Control

Buy Now
Questions 84

Dani is an ISC2 member and an employee of New Corporation. One of Dani's colleagues offers to share a file that contains an illicit copy of a newly released movie. What should Dani do

Options:

A.

Inform ISC2

B.

Inform law enforcement

C.

Accept the movie

D.

Refuse to accept

Buy Now
Questions 85

Which type of attack attempts to gain information by observing the devices power consumption

Options:

A.

DOS

B.

Side Channles

C.

XSS

D.

XSRF

Buy Now
Questions 86

John was recently offered a consulting opportunity as a side job. He is concerned that this might constitute a conflict of interest. Which one of the following sources that he needs to refer to take an appropriate decision?

Options:

A.

ISC2 Code of ethics

B.

Organizational code of ethics

C.

Country code of ethics

D.

Organizational security policy

Buy Now
Questions 87

What is a threat in the context of cybersecurity

Options:

A.

An inherent weakness or flaw in a system

B.

Something in need of protection

C.

The means by which a threat actor carries out their objectives

D.

A person or thing that takes action to exploit a target organizations system vulnerabilities

Buy Now
Questions 88

Actions, processes and tools for ensuring an organization can continue critical operations during a contingency.

Options:

A.

BC

B.

DR

C.

IR

D.

AII

Buy Now
Questions 89

What is the difference between business continuity planning and disaster recovery planning?

Options:

A.

Business continuity planning is abount restoring IT and communincations back to full operations after a dustruption, while disaster recovery planning is about maintaining criticla business functions

B.

Disaster recovery planning is about restoring IT and communications back to full operations after a disruption, while business continuity planning is about maintaining critical business functions

C.

Business continuity planning and disaster recovery planning are the same thisg

D.

Business continuity planning is about maintainig criticla business funtions before disasteroccurs

Buy Now
Questions 90

Which drives for the IPv6 introduction

Options:

A.

IPv4 was not secured

B.

IPv4 not combatible with new devices

C.

Because IPv4 was projected to be exhausted

D.

IPV6 support WiFi

Buy Now
Questions 91

Which of the following is not a source of redundant power

Options:

A.

Generator

B.

Utility

C.

UPS

D.

HVAC

Buy Now
Questions 92

Which of the following properties is not guaranteed by Digital signatures

Options:

A.

Authentication

B.

Confidentiality

C.

Non-Repudiation

D.

Integrity

Buy Now
Questions 93

XenServer, LVM, Hyper-V, ESXi are

Options:

A.

Type 2 Hypervisor

B.

Type 1 Hypervisor

C.

Both

D.

None

Buy Now
Questions 94

What is the purpose of immediate response procedures and checklists in a BCP

Options:

A.

To notify personnel that the BCP is being enacted

B.

To provide guidance for management

C.

To safeguard the confidentiality, integrity and availability of information

D.

To ensure business operations are accounted for in the plan

Buy Now
Questions 95

Which is not possible models for an Incident Response Team (IRT):

Options:

A.

Leveraged

B.

Dedicated

C.

Hybrid

D.

Outsourced

Buy Now
Questions 96

Port forwarding is also known as

Options:

A.

Port mapping

B.

Tunneling

C.

Punch through

D.

ALL

Buy Now
Questions 97

Who should participate in creating a BCP

Options:

A.

Only members from the IT department

B.

Only members from the management team

C.

Members from across the organization

D.

Only members from the finanace department

Buy Now
Questions 98

A cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites

Options:

A.

Phising

B.

Virus

C.

Spoofing

D.

DDOS

Buy Now
Questions 99

Which penetration testing technique requires the team to do the MOST work and effort?

Options:

A.

White box

B.

Blue box

C.

Gray box

D.

Black box

Buy Now
Questions 100

How do you distinguish Authentication and Identification

Options:

A.

Both Same

B.

Authentication is the process of verifying user identity and a user of a system or an application

C.

Authentication is the process of verifying user identity and Identification is the ability to identify uniquely quely Identification is the process to allow resource access

D.

Identification is the process of verifying user identity and Authentication is the process to allow resource access

Buy Now
Questions 101

Exhibit.

CC Question 101

What is the PRIMARY purpose of a web application firewall (WAF)?

Options:

A.

To protect the web server from DDoS attacks

B.

To monitor network traffic for intrusions

C.

To filter and block malicious web traffic and requests

D.

To manage SSL certificates

Buy Now
Questions 102

A company security team detected a cyber attack against it information systems and activates a set of procedures to mitigate the attack., What type of plan is this?

Options:

A.

Business continuty plan

B.

Incident response plan

C.

Disaster recvoery plan

D.

Security operation plan

Buy Now
Questions 103

An outward-facing IP address used to access the Internet.

Options:

A.

Global Address

B.

Private Address

C.

Public Address

D.

DNS

Buy Now
Questions 104

What is an incident in the context of cybersecurity

Options:

A.

Any observable occurrence in a network or system

B.

A deliberate security incident in which an intruder gains access to a system or system resource without authorization

C.

A particular attack that exploits system vulnerabilities

D.

An event that actually or potentially jeopardizes the confidentiality integrity or availability of an information system.

Buy Now
Questions 105

A device that routes traffic to the port of a known device

Options:

A.

Switch

B.

Hub

C.

Router

D.

Ethernet

Buy Now
Questions 106

allows for extremely granular restrictions within the IT environment, to the

point where rules can be applied to individual machines and/or users,

Options:

A.

DMZ

B.

Microsegmentation

C.

VLAN

D.

NAC

Buy Now
Questions 107

Which type of database combines related records and fields into a logical tree structure?

Options:

A.

Relational

B.

Hierarchical

C.

Object-oriented

D.

Network

Buy Now
Questions 108

The common term used to describe the mechanisms that control the temperature and humidity in a data center

Options:

A.

VLAN (virtual local area network)

B.

STAT (system temperature and timing)

C.

TAWC (temperature and water control)

D.

HVAC (heating, ventilation and air conditioning)

Buy Now
Questions 109

Which of the following is NOT one of the four typical ways of managing risk?

Options:

A.

Accept

B.

Avoid

C.

Mitigate

D.

Monitor

Buy Now
Questions 110

Which Prevents Threat

Options:

A.

Antivirus

B.

IDS

C.

SIEM

D.

HIDS

Buy Now
Questions 111

Which of the following is a characteristic of cloud

Options:

A.

Broad Network Access

B.

Rapid Elasticity

C.

Measured Service

D.

AII

Buy Now
Questions 112

Created by switches to logically segment a network without altering its physical topology.

Options:

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Buy Now
Questions 113

EKristal is the security administrator for a large online service provider. Kristal learns that the company is harvesting personal data of its customers and sharing the data with local governments where the company operates, without the knowledge of the users, to allow the governments to persecute users on the basis of their political and philosophical beliefs. The published user agreement states that the company will not share personal user data with any entities without the users' explicit permission. According to the ISC2 Code of Ethics, to whom does Kristal ultimately report in this situation?

Options:

A.

The company Kristal works for

B.

The governments of the countries where the company operates

C.

ISC2

D.

The users

Buy Now
Questions 114

What type of attack does the attacker store and reuse login information. Select the BEST answer?

Options:

A.

Man-in-the-middle attack

B.

Smurf attack

C.

DDoS attack

D.

Replay attack

Buy Now
Questions 115

IDS can be described in terms of what fundamental functional components?

Options:

A.

Response

B.

Information Sources

C.

Analysis

D.

All of the choices.

Buy Now
Questions 116

A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function.

Options:

A.

Availability

B.

Criticality

C.

Authorization

D.

Confidentiality

Buy Now
Questions 117

Example of Dynamic authorization

Options:

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

Buy Now
Questions 118

Which Regulation addresses personal privacy

Options:

A.

HIPAA

B.

GDPR

C.

NIST

D.

ISO

Buy Now
Questions 119

What is the most important aspect of security awareness/training?

Options:

A.

Maximizing business capabilities

B.

Protecting assets

C.

Protecting health and human safety

D.

Ensuring the confidentiality of data

Buy Now
Questions 120

What cybersecurity principle focuses on granting users only the privileges necessary to perform their job functions?

Options:

A.

Least privilege (Correct)

B.

defense in depth

C.

separation of duties

D.

need-to-know basis

Buy Now
Questions 121

Which of these is WEAKEST form of authentication we can implement?

Options:

A.

Something you know

B.

Something you are

C.

Something you have

D.

Biometric authentications

Buy Now
Questions 122

Finance Server and Transactions Server has restored its original facility after a disaster, what should be moved in FIRST?

Options:

A.

Management

B.

Most critical systems

C.

Most critical functions

D.

Least critical functions

Buy Now
Exam Code: CC
Exam Name: CC - Certified in Cybersecurity
Last Update: Apr 26, 2025
Questions: 407

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now CC testing engine

PDF (Q&A)

$36.75  $104.99
buy now CC pdf