Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ISC CC Practice Exam with Questions & Answers | Set: 8

Questions 71

A chief information security officer (CISO) at a large organization documented a policy that establishes the acceptable use of cloud environments for all staff. This is an example of

Options:
A.

Technical control

B.

Physical control

C.

Cloud control

D.

Management/Administrative control

ISC CC Premium Access
Questions 72

A/hich layer of the OSI Layer model is the target of a buffer overflow attack

Options:
A.

Layer 7

B.

Layer 3

C.

Layer 5

D.

Layer 4

Questions 73

XenServer, LVM, Hyper-V, ESXi are

Options:
A.

Type 2 Hypervisor

B.

Type 1 Hypervisor

C.

Both

D.

None

Questions 74

Risk tolerance also known as

Options:
A.

Risk threshold

B.

Risk appetite

C.

Acceptable risk

D.

AII

Questions 75

Which is an authorized simulated attack performed on a computer system to evaluate its security.

Options:
A.

Penetration test

B.

Security Testing

C.

Automated Testing

D.

Regression Testing

Questions 76

The practice of sending fraudulent communications that appear to come from a reputable source

Options:
A.

DOS

B.

Virus

C.

Spoofing

D.

Phishing

Questions 77

What is the purpose of multi-factor authentication (MFA) in 1AM?

Options:
A.

To simplify user access

B.

To eliminate the need for authentication

C.

To add an additional layer of security by requiring multiple forms of verification

D.

To grant unrestricted access to all users

Questions 78

A company security team detected a cyber attack against it information systems and activates a set of procedures to mitigate the attack., What type of plan is this?

Options:
A.

Business continuty plan

B.

Incident response plan

C.

Disaster recvoery plan

D.

Security operation plan

Questions 79

What is the primary purpose of a honeytoken in cybersecurity?

Options:
A.

To lure and detect attackers

B.

To encrypt sensitive data

C.

To enhance network performance

D.

To manage user access

Questions 80

What is the most important aspect of security awareness/training?

Options:
A.

Maximizing business capabilities

B.

Protecting assets

C.

Protecting health and human safety

D.

Ensuring the confidentiality of data

ISC Free Exams

ISC Free Exams
Examstrack provides free ISC exam prep materials and practice tests to support your ISC certification goals.