Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISC2 CC Exam Questions With 100% Correct Answers 2024/CC ISC2 Flashcards. 139 Questions and Correct Answers, With Complete Solution.

Beoordeling
-
Verkocht
-
Pagina's
15
Cijfer
A+
Geüpload op
11-03-2024
Geschreven in
2023/2024

ISC2 CC Exam Questions With 100% Correct Answers 2024/CC ISC2 Flashcards. 139 Questions and Correct Answers, With Complete Solution. What is MAC (Mandatory Access Control)? The operating system determines who gets access to resources. Much more restricted, not used as much. Which of the following is a detection control?: Bollards Turnstiles Firewalls Smoke sensors Smoke sensors. By definition, smoke detectors are fire protection devices employed for the early detection of fire. Firewalls are devices that filter incoming traffic, and are a type of logical preventive control. Bollards and turnstiles are types of physical preventive controls. Which of the following is NOT an ethical canon of the ISC2? -Advance and protect the profession -Act honorably, honestly, justly, responsibly and legally -Protect society, the common good, necessary public trust and confidence, and the infrastructure -Provide active and qualified service to principal Provide active and qualified service to principal. In the code of ethics, we read "Provide diligent and competent service to principals", and not "Provide active and qualified service to principals."; all the other options are valid canons of the code of ethics (see ISC2 Study Guide Chapter 1, Module 5). Which of the following is a data handling policy procedure? -Transform -Destroy -Encode -Collect Destroy. The data handling procedures are 'Classify', 'Categorize', 'Label', 'Store', 'Encrypt', 'Backup', and 'Destroy' (see ISC2 Study Guide, chapter 5, module 3). Which of the following properties is NOT guaranteed by Digital Signatures? -Non-Repudiation -Confidentiality -Authentication -Integrity

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

ISC2 CC Exam Questions With 100% Correct
Answers 2024/CC ISC2 Flashcards. 139
Questions and Correct Answers, With Complete
Solution.
What is MAC (Mandatory Access Control)?

The operating system determines who gets access to resources. Much more restricted, not used as
much.

Which of the following is a detection control?:
Bollards
Turnstiles
Firewalls
Smoke sensors

Smoke sensors. By definition, smoke detectors are fire protection devices employed for the early
detection of fire. Firewalls are devices that filter incoming traffic, and are a type of logical preventive
control. Bollards and turnstiles are types of physical preventive controls.

Which of the following is NOT an ethical canon of the ISC2?
-Advance and protect the profession
-Act honorably, honestly, justly, responsibly and legally
-Protect society, the common good, necessary public trust and confidence, and the infrastructure
-Provide active and qualified service to principal

Provide active and qualified service to principal. In the code of ethics, we read "Provide diligent and
competent service to principals", and not "Provide active and qualified service to principals."; all the
other options are valid canons of the code of ethics (see ISC2 Study Guide Chapter 1, Module 5).

Which of the following is a data handling policy procedure?
-Transform
-Destroy
-Encode
-Collect

Destroy. The data handling procedures are 'Classify', 'Categorize', 'Label', 'Store', 'Encrypt', 'Backup', and
'Destroy' (see ISC2 Study Guide, chapter 5, module 3).

Which of the following properties is NOT guaranteed by Digital Signatures?
-Non-Repudiation
-Confidentiality
-Authentication
-Integrity

, Confidentiality. A digital signature is the result of a cryptographic transformation of data which is useful
for providing: data origin authentication, data integrity, and non-repudiation of the signer (see NIST SP
800-12 Rev. 1 under Digital Signature). However, digital signatures cannot guarantee confidentiality (i.e.
the property of data or information not being made available or disclosed).

Which type of attack has the PRIMARY objective controlling the system from outside?
-Cross-Site Scripting
-Rootkits
-Trojans
-Backdoors

Backdoors. Trojans and Rootkits are often used to install backdoors. A backdoor is a malicious feature
that listens for commands on a specific logical port (TCP or UDP) and executes them on the attacked
system or device, thereby giving direct control of the system or device to a malicious outside entity (or
program). Cross-Site Scripting can execute code with the same permissions as the scripts generated by
the target website, compromising the confidentiality and integrity of data transfers between the website
and the client.

Which of the following is an example of an administrative security control?
-Acceptable Use Policies
-No entry signs
-Badge Readers
-Access Control Lists

Acceptable Use Policies. Policies are a type of administrative security controls. An access control list is a
type of technical security control. A badge reader and a 'No entry' sign are types of physical security
controls (see ISC2 Study Guide, Chapter 1, Module 3).

The process of verifying or proving the user's identification is known as:
-Integrity
-Authentication
-Authorization
-Confidentiality

Authentication. Authentication is the verification of the identity of a user, process or device, as a
prerequisite to allowing access to the resources in a given system. In contrast, authorization refers to the
permission granted to users, processes or devices to access specific assets. Confidentiality and integrity
are properties of information and systems, not processes.

A web server that accepts requests from external clients should be placed in which network?
DMZ
Intranet
Internal Network
VPN

DMZ. In Cybersecurity, a DMZ (demilitarized zone) is a physical or logical subnetwork that contains and
exposes external-facing services (such as web services). An Internal Network is an organization-
controlled network that is isolated from external access. An Intranet is itself an internal network that

Geschreven voor

Vak

Documentinformatie

Geüpload op
11 maart 2024
Aantal pagina's
15
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
ACADEMICAIDSTORE Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1214
Lid sinds
4 jaar
Aantal volgers
892
Documenten
12029
Laatst verkocht
3 dagen geleden
ACADEMICAID STORE

Welcome to ACADEMICAID store! We specialize in reliable test banks, exam questions with verified answers, practice exams, study guides, and complete exam review materials to help students pass on the first try. Our uploads support Nursing programs, professional certifications, business courses, accounting classes, and college-level exams. All documents are well-organized, accurate, exam-focused, and easy to follow, making them ideal for quizzes, midterms, finals, ATI & HESI prep, NCLEX-style practice, certification exams, and last-minute reviews. If you’re looking for trusted test banks, comprehensive exam prep, and time-saving study resources, you’re in the right place.

Lees meer Lees minder
4.1

176 beoordelingen

5
98
4
29
3
28
2
6
1
15

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen