Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ISC CC Practice Exam with Questions & Answers | Set: 3

Questions 21

What is the primary goal of implementing input validation in application security?

Options:
A.

To ensure all inputs are stored in a secure database

B.

To prevent unauthorized access to the application

C.

To validate and sanitize user inputs to prevent code injection attacks (Correct)

D.

To encrypt sensitive data transmitted between the client and server

ISC CC Premium Access
Questions 22

When the ISC2 Mail server sends mail to other mail servers it becomes —?

Options:
A.

SMTP Server

B.

SMTP Peer

C.

SMTP Master

D.

SMTP Client

Questions 23

Mark has purchased a MAC LAPTOP. He is scared of losing his screen and planning to buy an insurance policy. So, which risk management strategy is?

Options:
A.

Risk acceptance

B.

Risk deterrence

C.

Risk transference

D.

Risk mitigation

Questions 24

What is the main challenge in achieving non repudiation in electronic transactions

Options:
A.

Ensuring the identity of the sender and recipient is verified

B.

Ensuring the authenticity and integrity of the message

C.

Making sure the message is not tampered with during transmission

D.

All of the above

Questions 25

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called______

Options:
A.

Malware

B.

Zero-day

C.

Event

D.

Attack

Questions 26

Which type of attack attempts to gain information by observing the devices power consumption

Options:
A.

DOS

B.

Side Channles

C.

XSS

D.

XSRF

Questions 27

provide integrity services that allow a recipient to verify that a message has not been altered.

Options:
A.

Hashing

B.

encryption

C.

decryption

D.

encoding

Questions 28

Malicious code that acts like a remotely controlled "robot" for an attacker, with other Trojan and worm capabilities.

Options:
A.

Rootkit

B.

Ma I ware

C.

Bot

D.

Virus

Questions 29

What cybersecurity principle focuses on granting users only the privileges necessary to perform their job functions?

Options:
A.

Least privilege (Correct)

B.

defense in depth

C.

separation of duties

D.

need-to-know basis

Questions 30

Mark is configuring an automated data transfer between two hosts and is choosing an authentication technique for one host to connect to the other host. What approach would be best-suited for this scenario?

Options:
A.

Biometric

B.

Smart Card

C.

SSH Key

D.

Hard Coded Password

ISC Free Exams

ISC Free Exams
Examstrack provides free ISC exam prep materials and practice tests to support your ISC certification goals.