Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ISC CC Practice Exam with Questions & Answers | Set: 4

Questions 31

Which of the following is the LEAST secure communications protocol?

Options:
A.

CHAP

B.

IPsec

C.

PAP

D.

EAP

ISC CC Premium Access
Questions 32

An attack in which a user authenticated to a server unknowingly invokes unwanted actions after visiting a malicious website is known as:

Options:
A.

XSS

B.

CSRF

C.

Spoofing

D.

ALL

Questions 33

Which OSI layer does a VPN primarily operate at?

Options:
A.

Layer 5

B.

Layer 6

C.

Layer 1

D.

Layer 3

Questions 34

Which plan provides immediate response procedures and management guidance?

Options:
A.

BCP

B.

IRP

C.

DRP

D.

All

Questions 35

A prolonged, targeted cyberattack where an intruder remains undetected for an extended period is called:

Options:
A.

Spoofing

B.

Phishing

C.

DoS

D.

Advanced Persistent Threat

Questions 36

A set of instructions to detect, respond to, and recover from security incidents is a:

Options:
A.

BCP

B.

IRP

C.

DRP

D.

None

Questions 37

A company analyzes system requirements, functions, and interdependencies to prioritize contingency needs. What is this process called?

Options:
A.

BCP

B.

DRP

C.

IRP

D.

BIA

Questions 38

Which plan is activated when Incident Response and BCP fail?

Options:
A.

Risk management

B.

BIA

C.

DRP

D.

None

Questions 39

How does IPSec protect against replay attacks?

Options:
A.

By using sequence numbers

B.

By limiting network access

C.

By using digital signatures

D.

By encrypting all traffic

Questions 40

Activities necessary to restore IT and communications services are known as:

Options:
A.

Incident response

B.

Business continuity

C.

Risk management

D.

Disaster recovery