Practice Question 1
Practice Question 1
Question 2: Correct
What goal of security is enhanced by a STRONG business continuity program?
Explanation
ANS: Availability
Question 3: Correct
What term describes RISKS that originate inside the organization?
Explanation
Ans: Internal
Question 4: Correct
If Alice wants to send a message to Bob using symmetric cryptography, what key does
she use to encrypt the message?
Explanation
Ans: Shared secret key
Question 5: Incorrect
You are a member of the team that has been selected to create your organization's
business continuity plan. What is the most vital document in this plan?
Explanation
Ans: Business impact analysis (BIA)
Question 6: Correct
Sam Is Searching For A Forum Where He Can Share Threat Intelligence Information
With Others From His Industry In A Collaborative, Industry-Specific Forum. What Type
Of Organization Would Best Meet His Needs?
Explanation
Ans: Information Sharing & Analysis (ISACs)
Question 7: Incorrect
The purpose of mandatory vacations as a security measure is to discover which of the
following?
Explanation
Mandatory vacations are an administrative control which provides operational security
by forcing employees to take vacations and reinforces job rotation principles adding the
advantage that an employee sharing that job may determine if unethical occurrences
have been made.
Question 8: Correct
What is the minimum acceptable temperature for a data center?
Explanation
Ans: 64.4 degrees Fahrenheit
Question 9: Incorrect
What access management concept defines what rights or privileges a user has?
Explanation
Ans: Authorization
Explanation
Ans: to control airflow in the data center
Explanation
Ans: user identification with reusable password
Explanation
Main purpose of Separation of duties is Data Integrity. Data can"t modified by
unauthorized person
Audit log will give clear picture, who has made change in system and make them
accountable.
Explanation
Ans: Qualitative
Explanation
Ans: 443
Explanation
When done properly, a sanitization process fully ensures that data is not remnant on the
system before it is reused. Clearing and erasing can both be failure prone, and of
course destruction wouldn’t leave a machine or device to reuse
Explanation
Ans: NDA
Explanation
Ans: Transformer failure
Explanation
Ans: Volume and object
Explanation
Ans: business continuity coordinator
Explanation
Ans: 128 bits
Explanation
Ans: OpenID Connect
Explanation
Ans: Guidelines
Explanation
Ans: Supporting high resiliency
Explanation
Privilege creep is a common problem when employees change roles over time and their
privileges and permissions are not properly modified to reflect their new roles. Least
privilege issues are a design or implementation problem, and switching roles isn’t
typically what causes them to occur.
Question 36: Correct
Twinklena Is Implementing A Network Access Control Solution For An Open Guest
Network. She Would Like To Use An Approach That Does Not Require Installing
Software On Systems Joining The Network But Can Limit Them To A Quarantine
Network Until They Successfully Pass A Health Check. What NAC Solution Would Best
Meet Her Needs?
Explanation
Ans: Captive Portal
Explanation
Ans: Confidentiality, integrity, and availability
Explanation
Ans: Preventive
Explanation
Ans: Permissions
Explanation
The Secure File Transfer Protocol (SFTP) is specifically designed for encrypted file
transfer.
Explanation
Ans: IaaS
Explanation
Ans: TACACS+
Explanation
Ans: UDP 514
Explanation
Ans: BYOD policy
Explanation
Ans: Containing the damage
Explanation
Ans: Parallel test
Explanation
Ans: message integrity
Question 49: Correct
What is meant by MTBF?
Explanation
Ans: The average amount of time from one failure to the next
Explanation
Ans: Secure hashing algorithms
Explanation
Ans: Encryption
Explanation
Ans: Administrative
Explanation
Ans: Type 1
Explanation
Ans: risk analysis
Question 55: Incorrect
Which one of the following intellectual property protection mechanisms has the shortest
duration?
Explanation
Ans: Patents
Explanation
Ans: Private Cloud
Explanation
Ans: Cognitive passwords
Explanation
Ans: A qualitative risk analysis "Qualitative risk analysis" assesses impact in relative
terms such as high, medium, and low impact without assigning a dollar value.
Explanation
Ans: Encapsulating Security Payload (ESP)
An IPSec solution that uses ESP will encapsulate the entire original data packet when
implemented in a tunnel mode.
Explanation
Ans: Data backup
When CIA(Information Security principle) comes with available, please think, how we
can make availble data to all user i.e
Explanation
Ans: GDPR
Explanation
Ans: Deterrent
Explanation
Ans: Collision & Birthday
Explanation
Ans: ECC requires fewer resources.
Explanation
Ans: Context
Explanation
Ans: CIS
Explanation
Ans: Network
Explanation
Ans: Subjects
Explanation
Ans: 128-bit
Explanation
Ans: preventative administrative control
Explanation
Human first concept is the prime focus of isc2
Explanation
Ans: Physical
Explanation
Ans: RTO
Explanation
Ans: Business impact analysis (BIA)
Explanation
Ans: change log
The change log contains information about approved changes and the change
management process. While other logs may contain details about the change’s effect,
the audit trail for change management would be found in the change log.
Question 79: Correct
A web application accesses information in a database to retrieve user information. What
is the web application acting as?
Explanation
Ans:
Subjects are active entities that can access a passive object to retrieve information from
or about an object. Subjects can also make changes to objects when they are properly
authorized. Users are often subjects, but not all subjects are users.
Explanation
Ans: To protect data at rest.
Explanation
Ans: Out-of-band identity proofing
Explanation
Ans: Availability
Explanation
Ans: A critical application
Explanation
Main drawback is privay, because same hdd can be used for other client too. SO in
cloud main drawback of Data is Confidentiality
Question 85: Incorrect
Creating incident response policies for an organization would be an example of ---?
Explanation
Ans: An administrative control
Administrative controls are “managerial” and are a part of corporate security policy.
Explanation
Ans: Hybrid
Explanation
Ans: 3
Explanation
Ans: Incremental
Explanation
Ans: DNS
Explanation
Ans: Registration
Registration is the process of adding a user to an identity management system. This
includes creating their unique identifier and adding any attribute information that is
associated with their identity. Proofing occurs when the user provides information to
prove who they are. Directories are managed to maintain lists of users, services, and
other items. Session management tracks application and user sessions.
Explanation
Structured and unstructured
Explanation
Ans: Fingerprint scanner
Explanation
This broad access may indirectly violate all of the listed security principles, but it is most
directly a violation of least privilege because it grants users privileges that they do not
need for their job functions
Explanation
Ans: SLE
Explanation
Ans: Baselining
Explanation
Ans: asymmetric encryption
Explanation
Ans: Business continuity planning
Explanation
Ans: Network vulnerability scanning
Explanation
Ans: a proximity detector
Explanation
Ans: Router"
https://www.udemy.com/course/isc2-certified-in-cybersecuritycc-practice-
exam/learn/quiz/5815616/result/962902952#:~:text=ISC2%20%2D%20CC%2Dcertified,
Ans%3A%20Router