Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ISC CC Practice Exam with Questions & Answers | Set: 9

Questions 81

Example of Type 1 Authentication

Options:
A.

Password

B.

Smart Card

C.

Finger Print

D.

RSA Token

ISC CC Premium Access
Questions 82

How do IT professionals differentiate between typical IT problems and security incidents?

Options:
A.

By providing medical assistance at accident scenes

B.

By collection evidence and reposting the incident

C.

By receiving specific training on incident response

D.

By participating in remediation and lessons learns stages

Questions 83

The primary goal of a risk assessment

Options:
A.

Avoid Risk

B.

Estimate and Prioritize Risk

C.

Ignore risk

D.

Evaluate the Impact

Questions 84

Protection against an individual falsely denying having performed a particular action

Options:
A.

Authentication

B.

Identification

C.

Verification

D.

Non repudiation

Questions 85

A company data center has been breached by hackers and all its systems have been taken down what is the main objective of the DRP in such a scenario?

Options:
A.

To relocate the data center to another location

B.

To ensure the physical safety of employees in the data center

C.

To investigate and prosecute the hackers responsible of the attack

D.

To restore the IT systems to their last known state

Questions 86

Information should be consistently and readily accessible for authorized parties ?

Options:
A.

Confidentiality

B.

Authentication

C.

Availability

D.

Non-repudiation

Questions 87

Which one of the following groups is NOT normally part of an organization's cybersecurity incident response team?

Options:
A.

Technical Subject Matter Experts

B.

Cybersecurity Experts

C.

Management

D.

Law Enforcement

Questions 88

An analysis of an information system's requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption.

Options:
A.

BIA

B.

DR

C.

BCP

D.

IRP

Questions 89

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n)

Options:
A.

Exploit

B.

Intrusion

C.

Event

D.

Malware

Questions 90

The common term used to describe the mechanisms that control the temperature and humidity in a data center

Options:
A.

VLAN (virtual local area network)

B.

STAT (system temperature and timing)

C.

TAWC (temperature and water control)

D.

HVAC (heating, ventilation and air conditioning)

ISC Free Exams

ISC Free Exams
Examstrack provides free ISC exam prep materials and practice tests to support your ISC certification goals.