Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

(ISC)2 Certified in Cybersecurity - Exam Prep 2025 With 100% Correct Answers

Beoordeling
-
Verkocht
-
Pagina's
108
Cijfer
A+
Geüpload op
16-08-2025
Geschreven in
2025/2026

Document specific requirements that a customer has about any aspect of a vendor's service performance. A) DLR B) Contract C) SLR D) NDA - CORRECT ANSWERC) SLR (Service-Level Requirements) _________ identifies and triages risks. - CORRECT ANSWERRisk Assessment _________ are external forces that jeopardize security. - CORRECT ANSWERThreats _________ are methods used by attackers. - CORRECT ANSWERThreat Vectors _________ are the combination of a threat and a vulnerability. - CORRECT ANSWERRisks We rank risks by _________ and _________. - CORRECT ANSWERLikelihood and impact _________ use subjective ratings to evaluate risk likelihood and impact. - CORRECT ANSWERQualitative Risk Assessment

Meer zien Lees minder
Instelling
2 Certified In Cybersecurity
Vak
2 Certified in Cybersecurity

Voorbeeld van de inhoud

(ISC)2 Certified in Cybersecurity -
Exam Prep 2025 With 100% Correct
Answers

Document specific requirements that a customer has about any aspect of a vendor's service
performance.



A) DLR

B) Contract

C) SLR

D) NDA - CORRECT ANSWER✔✔C) SLR (Service-Level Requirements)



_________ identifies and triages risks. - CORRECT ANSWER✔✔Risk Assessment



_________ are external forces that jeopardize security. - CORRECT ANSWER✔✔Threats



_________ are methods used by attackers. - CORRECT ANSWER✔✔Threat Vectors



_________ are the combination of a threat and a vulnerability. - CORRECT ANSWER✔✔Risks



We rank risks by _________ and _________. - CORRECT ANSWER✔✔Likelihood and impact



_________ use subjective ratings to evaluate risk likelihood and impact. - CORRECT
ANSWER✔✔Qualitative Risk Assessment

,_________ use objective numeric ratings to evaluate risk likelihood and impact. - CORRECT
ANSWER✔✔Quantitative Risk Assessment



_________ analyzes and implements possible responses to control risk. - CORRECT
ANSWER✔✔Risk Treatment



_________ changes business practices to make a risk irrelevant. - CORRECT ANSWER✔✔Risk
Avoidance



_________ reduces the likelihood or impact of a risk. - CORRECT ANSWER✔✔Risk Mitigation



An organization's _________ is the set of risks that it faces. - CORRECT ANSWER✔✔Risk Profile



_________ Initial Risk of an organization. - CORRECT ANSWER✔✔Inherent Risk



_________ Risk that remains in an organization after controls. - CORRECT ANSWER✔✔Residual
Risk



_________ is the level of risk an organization is willing to accept. - CORRECT ANSWER✔✔Risk
Tolerance



_________ reduce the likelihood or impact of a risk and help identify issues. - CORRECT
ANSWER✔✔Security Controls



_________ stop a security issue from occurring. - CORRECT ANSWER✔✔Preventive Control



_________ identify security issues requiring investigation. - CORRECT ANSWER✔✔Detective
Control

,_________ remediate security issues that have occurred. - CORRECT ANSWER✔✔Recovery
Control



Hardening == Preventative - CORRECT ANSWER✔✔Virus == Detective



Backups == Recovery - CORRECT ANSWER✔✔For exam (Local and Technical Controls are the
same)



_________ use technology to achieve control objectives. - CORRECT ANSWER✔✔Technical
Controls



_________ use processes to achieve control objectives. - CORRECT ANSWER✔✔Administrative
Controls



_________ impact the physical world. - CORRECT ANSWER✔✔Physical Controls



_________ tracks specific device settings. - CORRECT ANSWER✔✔Configuration Management



_________ provide a configuration snapshot. - CORRECT ANSWER✔✔Baselines (track changes)



_________ assigns numbers to each version. - CORRECT ANSWER✔✔Versioning



_________ serve as important configuration artifacts. - CORRECT ANSWER✔✔Diagrams



_________ and _________ help ensure a stable operating environment. - CORRECT
ANSWER✔✔Change and Configuration Management

, Purchasing an insurance policy is an example of which risk management strategy? - CORRECT
ANSWER✔✔Risk Transference



What two factors are used to evaluate a risk? - CORRECT ANSWER✔✔Likelihood and Impact



What term best describes making a snapshot of a system or application at a point in time for
later comparison? - CORRECT ANSWER✔✔Baselining



What type of security control is designed to stop a security issue from occurring in the first
place? - CORRECT ANSWER✔✔Preventive



What term describes risks that originate inside the organization? - CORRECT
ANSWER✔✔Internal



What four items belong to the security policy framework? - CORRECT ANSWER✔✔Policies,
Standards, Guidelines, Procedures



_________ describe an organization's security expectations. - CORRECT ANSWER✔✔Policies
(mandatory and approved at the highest level of an organization)



_________ describe specific security controls and are often derived from policies. - CORRECT
ANSWER✔✔Standards (mandatory)



_________ describe best practices. - CORRECT ANSWER✔✔Guidelines
(recommendations/advice and compliance is not mandatory)



_________ step-by-step instructions. - CORRECT ANSWER✔✔Procedures (not mandatory)

Geschreven voor

Instelling
2 Certified in Cybersecurity
Vak
2 Certified in Cybersecurity

Documentinformatie

Geüpload op
16 augustus 2025
Aantal pagina's
108
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$23.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
QUILLSKY Yale University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
521
Lid sinds
3 jaar
Aantal volgers
275
Documenten
13964
Laatst verkocht
2 weken geleden
,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS IS THE KEY TO STUDENTS CAREER EXCELLENCE!!!

On this page, you find all documents, package deals, and flashcards offered by seller MAXGRADES WELCOME TO MAXGRADES ALL THE BEST !!!!!!

3.6

129 beoordelingen

5
50
4
23
3
28
2
6
1
22

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen