Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ISC2 Cybersecurity Certification Exams

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
23-11-2024
Written in
2024/2025

ISC2 Cybersecurity Certification Exams

Institution
Course

Content preview

ISC2 Cybersecurity Certification Exams, Pre & Post
Assessments (Latest 2024/ 2025 Updates STUDY
BUNDLE PACKAGE) 100% Correct Questions and
Verified Answers| Grade A
According to the canon "Provide diligent and competent service to principals", ISC2
professionals are to: - ANSWERAvoid apparent or actual conflicts of interest.

Risk Management is: - ANSWERThe identification, evaluation and prioritization of
risks.

What is the consequence of a Denial Of Service attack? - ANSWERExhaustion of
device resources

In which cloud model does the cloud customer have LESS responsibility over the
infrastructure? - ANSWERSaaS (Software as a Service)

The SMTP protocol operates at OSI Level: - ANSWER7

Which of these would be the best option if a network administrator needs to control
access to a network? - ANSWERNAC

Which security principle states that a user should only have the necessary
permission to execute a task? - ANSWERLeast Privilege

Which of the following cloud models allows access to fundamental computer
resources? - ANSWERInfrastructure as a Service (IaaS) provides the capability to
provision processing, storage, networks, and other fundamental computing
resources

Which of these has the PRIMARY objective of identifying and prioritizing critical
business processes? - ANSWERBusiness Impact Analysis

Which access control model specifies access to an object based on the subject's role
in the organization? - ANSWERThe role-based access control (RBAC) model is well
known for governing access to objects based on the roles of individual users within
the organization.

Which of the following Cybersecurity concepts guarantees that information is
accessible only to those authorized to access it? - ANSWERConfidentiality

Which of the following are NOT types of security controls? - ANSWERStorage
controls

, Which port is used to secure communication over the web (HTTPS)? - ANSWERPort
443 is the one reserved for HTTPS connections.

In Change Management, which component addresses the procedures needed to
undo changes? - ANSWERRollback phase addresses the actions to take when the
monitoring change suggests a failure or inadequate performance.

Which type of attack attempts to gain information by observing the device's power
consumption? - ANSWERside-channel attack
is a passive and non-invasive attack aiming to extract information from a running
system

Which of the following canons is found in the ISC2 code of ethics? - ANSWER"Provide
diligent and competent service to principals" contains the accurate text of the ISC2
code of ethics.

Which of these is the PRIMARY objective of a Disaster Recovery Plan? -
ANSWERRestore company operation to the last-known reliable operation state

Which of these is not an attack against an IP network? - ANSWERSide Channel
Attacks are non-invasive attacks that extract information from devices (typically
devices running cryptographic algorithms), and therefore do not aim at IP networks

Which of the following is NOT a type of learning activity used in Security Awareness?
- ANSWERTutorial
is a form of training, but is not on the list of types of learning activities.

Which are the components of an incident response plan? - ANSWERPreparation->
Detection and Analysis -> Containment, Education and Recovery -> Post Incident
Activity

Which type of attack embeds malicious payload inside a reputable or trusted
software? - ANSWERTrojans
are a type of software that appears legitimate but has hidden malicious functions
that evade security mechanisms, typically by exploiting legitimate authorizations of
the user that invokes the program.

Which of these is the most efficient and effective way to test a business continuity
plan? - ANSWERSimulations
are full re-enactments of business continuity procedures and can involve most, if not
all, of your workforce.

Security posters are an element PRIMARILY employed in: - ANSWERSecurity
Awareness

Which of these types of user is LESS likely to have a privileged account? -
ANSWERExternal workers

Connected book

Written for

Course

Document information

Uploaded on
November 23, 2024
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
knoowy0010 Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
1 year
Number of followers
0
Documents
1039
Last sold
5 months ago

4.7

140 reviews

5
111
4
14
3
12
2
3
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions