Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ISC CC Practice Exam with Questions & Answers | Set: 5

Questions 41

A team activates procedures to mitigate a cyberattack. What plan is this?

Options:
A.

Business Continuity Plan

B.

Incident Response Plan

C.

Disaster Recovery Plan

D.

Security Operations Plan

ISC CC Premium Access
Questions 42

What does the termbusinessin business continuity planning refer to?

Options:
A.

The financial performance of the organization

B.

The technical systems of the organization

C.

The operational aspects of the organization

D.

The physical infrastructure of the organization

Questions 43

What does Personally Identifiable Information (PII) pertain to?

Options:
A.

Information about an individual's health status

B.

Data about an individual that could be used to identify them

C.

Trade secrets, research, business plans, and intellectual property

D.

The importance assigned to information by its owner

Questions 44

The DevOps team has updated the application source code. Tom discovered that many unauthorized changes have been made. What is the BEST control Tom can implement to prevent a recurrence of this problem?

Options:
A.

Backup

B.

File labels

C.

Security audit

D.

Hashing

Questions 45

Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

Options:
A.

Brute-force attack

B.

Dictionary attack

C.

Social engineering attack

D.

Replay attack

Questions 46

Which type of network is set up similar to the internet but is private to an organization? Select the MOST appropriate answer.

Options:
A.

Extranet

B.

VLAN

C.

Intranet

D.

VPN

Questions 47

An attacker places themselves between two communicating devices is known as:

Options:
A.

Phishing

B.

Spoofing

C.

On-Path attack

D.

All

Questions 48

What is an IPSec replay attack?

Options:
A.

An attack where an attacker modifies packets in transit

B.

An attack where an attacker eavesdrops on network traffic

C.

An attack where an attacker overloads a network with traffic

D.

An attack where an attacker attempts to inject packets in an existing session

Questions 49

Communication between end systems is encrypted using a key, often known as ________?

Options:
A.

Temporary key

B.

Section key

C.

Public key

D.

Session key

Questions 50

An external entity attempts unauthorized access to your IT environment. This is a(n):

Options:
A.

Exploit

B.

Intrusion

C.

Event

D.

Malware