Mid-Test 1
Mid-Test 1
Mid-Test 1
com/852334995/isc2-certified-in-cybersecurity-cc-
practice-exam-questions-flash-cards/
User ID
Password
Fingerprint
Law
Procedure
Standard
Policy
Natural disaster
Unintentional damage to the system caused by a user
A laptop with sensitive data on it
An external attacker trying to gain unauthorized access to the environment
Acceptance
Avoidance
Mitigation
Transference
The Triffid Corporation publishes a policy that states all personnel will
act in a manner that protects health and human safety. The security
office is tasked with writing a detailed set of processes on how
employees should wear protective gear such a hardhat and gloves
when in haradous areas. This detailed set of process is a ......
1 point
Policy
Procedure
Standard
Law
The city of Grampon wants to know where all its public vehicles
(garbage trucks, police cars, etc.) are at all times, so the city has GPS
transmitters installed in all the vehicles. What kind of control is this?
1 point
Administrative
Entrenched
Physical
Technical
Law
Policy
Standard
Procedure
Law, procedure
Standard, law
Law, standard
Policy, law
Non-repudiation
Multifactor authentication
Biometrics
Privacy
Physical
Administrative
Passive
Technical
Vulnerability
Asset
Threat
Likelihood
As soon as possible
At the very beginning of a disaster
When senior management decides
When instructed to do so by regulators
Intrusion
Exploit
Disclosure
Publication
You are reviewing log data from a router; there is an entry that shows
a user sent traffic through the router at 11:45 am, local time,
yesterday. This is an example of a(n) _______.
1 point
Incident
Event
Attack
Threat
ISC
Senior management
The security manager
Investor
True of False? Business continuity planning is a reactive procedure
that restores business operations after a disruption occurs.
1 point
TRUE
FALSE
Broadcast
Stored
Deleted
Modified
Security administrator
Data entry professional
System administrator
Help Desk technician
Detective
Preventive
Deterrent
Logical
Biometric
Law
Log
Firewall
Lack of accuracy
Potential privacy concerns
Retention of physiological data past the point of employment
Legality
Prachi works as a database administrator for Triffid, Inc. Prachi is
allowed to add or delete users, but is not allowed to read or modify the
data in the database itself. When Prachi logs onto the system, an
access control list (ACL) checks to determine which permissions
Prachi has.
In this situation, what is the database?
1 point
The object
The role
The subject
The site
Increased logging
Multifactor authentication
Increased auditing
Security deposit
The subject
The object
The rule
The firmware
Which of the following will have the most impact on determining the
duration of log retention?
1 point
Personal preference
Applicable laws
Industry standards
Type of storage media
The subject
The rule
The file
The object
Larry and Fern both work in the data center. In order to enter the data
center to begin their workday, they must both present their own keys
(which are different) to the key reader, before the door to the data
center opens.
Which security concept is being applied in this situation?
1 point
Defense in depth
Segregation of duties
Least privilege
Dual control
Two-person integrity
Segregation of duties
Defense in depth
Penetration testing
Uniqueness
Destruction
Redundancy
Hue
Triffid, Inc., has deployed anti-malware solutions across its internal IT
environment. What is an additional task necessary to ensure this
control will function properly?
1 point
Pay all employees a bonus for allowing anti-malware solutions to be run on their systems
Update the anti-malware solution regularly
Install a monitoring solution to check the anti-malware solution
Alert the public that this protective measure has been taken
Shelf
Closet
Bracket
House
Side channel
DDOS
On-path
Physical
VPN
Least privilege
Internet
Defense in depth
Which common cloud service model only offers the customer access
to a given application?
1 point
Firewall
Turnstile
Anti-malware
Badge system