ISC Certified in Cybersecurity Exam With Complete Solutions
ISC Certified in Cybersecurity Exam With Complete Solutions Which of the following can be used to map data flows through an organization and the relevant security controls used at each point along the way? (D5.1, L5.1.1) a. Encryption b. Hashing c. Hard Copy d. Data Life Cycle - answerData Life Cycle Why is an asset inventory so important? a. It tells you what to encrypt b. You can't protect what you don't know you have c. The law requires it d. It contains a price list - answerYou can't protect what you don't know you have Who is responsible for publishing and signing the organization's policies? (D5.3, L5.3.1) a. Security office b. Human Resources c. Senior Management d. Legal Department - answerSenior Mangagement Which of the following is always true about logging? (D5.1, L5.1.3) a. Logs should be very detailed b. Logs should be in English c. Logs should be concise d. Logs should be stored separately from the systems they're logging - answerLogs should be stored separately from the systems they're logging A mode of encryption for ensuring confidentiality efficiently, with a minimum amount of processing overhead (D5.1, L5.1.3) a. Asymmetric b. Symmetric c. Hashing d. Covert - answerSymmetric A ready visual cue to let anyone in contact with the data know what the classification is. (D5.1, L5.1.1) a. Encryption b. Label c. Graphics d. Photos - answerLabel A set of security controls or system settings used to ensure uniformity of configuration throughout the IT environment. (D5.2, L5.2.1) a. Patches b. Inventory c. Baseline d. Policy - answerBaseline What is the most important aspect of security awareness/training? (D5.4, L5.4.1) a. Protecting assets b. Maximizing business capabilities c. Ensuring the confidentiality of data d. Protecting health and human safety - answerProtecting health and human safety Which entity is most likely to be tasked with monitoring and enforcing security policy? (D5.3, L5.3.1) a. The Human Resources Office b. The legal department c. Regulators d. The security office - answerThe security office Which organizational policy is most likely to indicate which types of smartphones can be used to connect to the internal IT environment? (D5.3, L5.3.1) a. The CM policy (change management) b. The password policy c. The AUP (acceptable use policy) d. The BYOD policy (bring your own device) - answerThe BYOD policy (bring your own device) Common network device used to connect networks. Server Endpoint Router Switch - answerRouter A common network device used to filter traffic Server Endpoint Ethernet Firewall - answerFirewall endpoint ------ Web server Which port number is associated with the pr
Written for
- Institution
- ISC Certified in Cybersecurity
- Course
- ISC Certified in Cybersecurity
Document information
- Uploaded on
- March 4, 2024
- Number of pages
- 21
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
isc certified in cybersecurity exam with complete