Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ISC CC Practice Exam with Questions & Answers | Set: 3

Questions 21

Configuration settings or parameters stored as data and managed through a GUI are examples of:

Options:
A.

Logical access control

B.

Physical access control

C.

Administrative access control

ISC CC Premium Access
Questions 22

Which is the first step in the risk management process?

Options:
A.

Risk response

B.

Risk mitigation

C.

Risk identification

D.

Risk assessment

Questions 23

Which of the following attacks can TLS help mitigate?

Options:
A.

Cross-site Scripting (XSS) attacks

B.

Social engineering attacks

C.

Man-in-the-middle (MITM) attacks

D.

SQL injection attacks

Questions 24

Which of the following is a characteristic of cloud computing?

Options:
A.

Broad network access

B.

Rapid elasticity

C.

Measured service

D.

All

Questions 25

How do you distinguish authentication and identification?

Options:
A.

Both are the same

B.

Authentication verifies identity

C.

Authentication verifies identity; identification claims identity

D.

Identification verifies identity

Questions 26

A company wants to prevent employees from bringing unauthorized electronic devices into the workspace. Which physical control is best?

Options:
A.

Metal detectors

B.

Security guards

C.

RFID scanners

D.

Baggage X-ray machines

Questions 27

What is the BEST defense against dumpster diving attacks?

Options:
A.

Anti-malware software

B.

Clean desk policy

C.

Data loss prevention tools

D.

Shredding

Questions 28

Which one of the following cryptographic algorithms does NOT depend upon the prime factorization problem?

Options:
A.

RSA – Rivest-Shamir-Adleman

B.

GPG – GNU Privacy Guard

C.

ECC – Elliptic Curve Cryptosystem

D.

PGP – Pretty Good Privacy

Questions 29

Removing the belief that a network has any trusted space and enforcing security at the most granular level is known as:

Options:
A.

Zero Trust

B.

Defense in Depth

C.

Least Privilege

D.

All

Questions 30

A ________ creates an encrypted tunnel to protect your personal data and communications.

Options:
A.

HTTPS

B.

VPN

C.

Anti-virus

D.

IDS