Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ISC CC Practice Exam with Questions & Answers | Set: 2

Questions 11

Which uses encrypted, machine-generated codes to verify a user's identity.

Options:
A.

Basic Authentication

B.

Form Based Authentication

C.

Token Based Authentication

D.

AII

ISC CC Premium Access
Questions 12

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n)

Options:
A.

Exploit

B.

Intrusion

C.

Event

D.

Malware

Questions 13

A company needs to protect its confidential data from unauthorized access which logical control is best suited for this scenario

Options:
A.

Encryption

B.

Firewall

C.

Antivirus

D.

Hashing

Questions 14

Can be considered to be a fingerprint of the file or message

Options:
A.

Hashing .

B.

encryption

C.

decryption

D.

encoding

Questions 15

An attackers place themselves between two devices (often a web browser and a web server)

Options:
A.

Phishing

B.

Spoofing

C.

On Path

D.

All

Questions 16

Which of the following is NOT one of the three main components of a sql database?

Options:
A.

Views

B.

Schemas

C.

Tables

D.

Object-oriented interfaces

Questions 17

What is IPSEC reply attack

Options:
A.

An attack where an attacker modifies packets in transit

B.

An attack where an attacker eavesdrops on network traffic

C.

An attack where an attacker overloads a network with traffic

D.

An attack where an attacker attempts to inject packets in an existing sessio

Questions 18

The mitigation of violations of security policies and recommended practices

Options:
A.

DR

B.

IR

C.

Threat hunting

D.

Incident response

Questions 19

What kind of control is, when we add a backup firewall that takes over if the main one stops working?

Options:
A.

Clustering

B.

High availability(HA)

C.

Load balancing

D.

Component redundancy

Questions 20

Which of the following best describes the type of technology the team should implement to increase the work effort of buffer overflow attacks?

Options:
A.

Address space layout randomization

B.

Memory induction application

C.

Input memory isolation

D.

Read-only memory integrity checks

ISC Free Exams

ISC Free Exams
Examstrack provides free ISC exam prep materials and practice tests to support your ISC certification goals.