CC ISC2 Dumps 1
CC ISC2 Dumps 1
CC ISC2 Dumps 1
Q1. What must be done when data kept for more then 1 year.
Ans. PAAS
Q4. Whats need to be reviewed when a vendor doesn't fulfill the contract agreement, what
document MUDT be referred in order to penalized vendor
Ans. SLA
Ans. MDM
Ans. FTP
Ans. Integrity
Q8. What ctitical document should department consider for critical assets integration
Ans. BIA
Ans. BCP
Ans. Leadership
Ans. Availability
Ans. OTP
Q16. What physical control should be deployed in data center to restrict unauthorized access
Q17. Which security model best describes when a user needs to login required verification
Ans. TCPDUMP
Ans. SaaS
Q21. In which attack does sn attacker controls remotely victim machine and modifying system
resources.
Ans. Botnet
Q22. Which model only addresses data confidentiality and not integrity
Ans. Bell-Lapadula
Q23. Which Access Matrix model, in general, provides object access rights (read/write/execute, or
R/W/X) to subjects.
Q24. In which access control matrix owner can determine the access privileges.
Ans. DAC
Q25. Which model provide access to the user based on their identities and data.
Ans. MAC
Q26. Which access model allows implementing “least privilege” policies, limits access to just the
resources users need to do their jobs.
Ans. RBAC
Q27. The security model uses an access matrix and defines a "No read up", "No write down" policy.
Q28. Which controls allow denial of, service is in network. It is simply a list of the services available,
each with a list of the hosts permitted to use the services.
Ans. ACL
Ans. Human