100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ISC2 Pre-Course Assessment 2023 with complete solution $12.99   Add to cart

Exam (elaborations)

ISC2 Pre-Course Assessment 2023 with complete solution

 120 views  0 purchase
  • Course
  • Institution

ISC2 Pre-Course Assessment 2023 with complete solution Steve is a security practitioner assigned to come up with a protective measure for ensuring cars don't collide with pedestrians. What is probably the most effective type of control for this task? Physical A system that collects transaction...

[Show more]

Preview 2 out of 6  pages

  • August 14, 2023
  • 6
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
ISC2 Pre-Course Assessment 2023 with complete solution
Steve is a security practitioner assigned to come up with a protective measure for
ensuring cars don't collide with pedestrians. What is probably the most effective
type of control for this task?
Physical
A system that collects transactional information and stores it in a record in order
to show which users performed which actions is an example of providing
________.
Non-repudiation
Of the following, which would probably not be considered a threat?
A laptop with sensitive data on it
The city of Grampon wants to know where all its public vehicles (garbage trucks,
police cars, etc.) are at all times, so the city has GPS transmitters installed in all
the vehicles. What kind of control is this?
Technical
Guillermo logs onto a system and opens a document file. In this example,
Guillermo is:
The subject
Gary is unable to log in to the production environment. Gary tries three times and
is then locked out of trying again for one hour. Why?
Gary's actions look like an attack
Which type of fire-suppression system is typically the least expensive?
Water
An IoT (Internet of Things) device is typified by its effect on or use of the _____
environment.
Physical
The concept that the deployment of multiple types of controls provides better
security than using a single type of control.
Defense in depth
Zarma is an (ISC)² member and a security analyst for Triffid Corporation. One of
Zarma's colleagues is interested in getting an (ISC)2 certification and asks Zarma
what the test questions are like. What should Zarma do?
Explain the style and format of the questions, but no detail
(ISC)² publishes a Common Body of Knowledge (CBK) that IT security
practitioners should be familiar with; this is recognized throughout the industry
as a set of material that is useful for practitioners to refer to. Certifications can be
issued for demonstrating expertise in this Common Body of Knowledge. What
kind of document is the Common Body of Knowledge?
Standard
Hoshi is an (ISC)2 member who works for the Triffid Corporation as a data
manager. Triffid needs a new firewall solution, and Hoshi is asked to recommend
a product for Triffid to acquire and implement. Hoshi's cousin works for a firewall
vendor; that vendor happens to make the best firewall available. What should
Hoshi do?
disclose the relationship, but recommend the vendor/product

, Sophia is visiting Las Vegas and decides to put a bet on a particular number on a
roulette wheel. This is an example of _________.
Acceptance
In risk management concepts, a(n) _________ is something a security practitioner
might need to protect.
Asset
A _____ is a record of something that has occurred.
Log
Prachi works as a database administrator for Triffid, Inc. Prachi is allowed to add
or delete users, but is not allowed to read or modify the data in the database
itself. When Prachi logs onto the system, an access control list (ACL) checks to
determine which permissions Prachi has.
In this situation, what is the database?
The object
Larry and Fern both work in the data center. In order to enter the data center to
begin their workday, they must both present their own keys (which are different)
to the key reader, before the door to the data center opens.
Which security concept is being applied in this situation?
Dual control
All of the following are typically perceived as drawbacks to biometric systems,
except:
Lack of accuracy
Which of the following is one of the common ways potential attacks are often
identified?
Users report unusual systems activity/response to Help Desk or the security office
The section of the IT environment that is closest to the external world; where we
locate IT systems that communicate with the Internet.
DMZ (demilitarized zone)
The logical address of a device connected to the network or Internet.
Internet Protocol (IP) address
Which of the following activities is usually part of the configuration management
process, but is also extremely helpful in countering potential attacks?
Updating and patching systems
Which common cloud deployment model typically features only a single
customer's data/functionality stored on specific systems/hardware?
Private
Triffid, Inc., has many remote workers who use their own IT devices to process
Triffid's information. The Triffid security team wants to deploy some sort of
sensor on user devices in order to recognize and identify potential security
issues. Which of the following is probably most appropriate for this specific
purpose?
HIDS (host-based intrusion-detection systems)
Triffid, Inc., has deployed anti-malware solutions across its internal IT
environment. What is an additional task necessary to ensure this control will
function properly?
Update the anti-malware solution regularly

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller magdamwikash23. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80202 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart