100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISC Certified in Cybersecurity Exam With Complete Solutions

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
04-03-2024
Written in
2023/2024

ISC Certified in Cybersecurity Exam With Complete Solutions Which of the following can be used to map data flows through an organization and the relevant security controls used at each point along the way? (D5.1, L5.1.1) a. Encryption b. Hashing c. Hard Copy d. Data Life Cycle - answerData Life Cycle Why is an asset inventory so important? a. It tells you what to encrypt b. You can't protect what you don't know you have c. The law requires it d. It contains a price list - answerYou can't protect what you don't know you have Who is responsible for publishing and signing the organization's policies? (D5.3, L5.3.1) a. Security office b. Human Resources c. Senior Management d. Legal Department - answerSenior Mangagement Which of the following is always true about logging? (D5.1, L5.1.3) a. Logs should be very detailed b. Logs should be in English c. Logs should be concise d. Logs should be stored separately from the systems they're logging - answerLogs should be stored separately from the systems they're logging A mode of encryption for ensuring confidentiality efficiently, with a minimum amount of processing overhead (D5.1, L5.1.3) a. Asymmetric b. Symmetric c. Hashing d. Covert - answerSymmetric A ready visual cue to let anyone in contact with the data know what the classification is. (D5.1, L5.1.1) a. Encryption b. Label c. Graphics d. Photos - answerLabel A set of security controls or system settings used to ensure uniformity of configuration throughout the IT environment. (D5.2, L5.2.1) a. Patches b. Inventory c. Baseline d. Policy - answerBaseline What is the most important aspect of security awareness/training? (D5.4, L5.4.1) a. Protecting assets b. Maximizing business capabilities c. Ensuring the confidentiality of data d. Protecting health and human safety - answerProtecting health and human safety Which entity is most likely to be tasked with monitoring and enforcing security policy? (D5.3, L5.3.1) a. The Human Resources Office b. The legal department c. Regulators d. The security office - answerThe security office Which organizational policy is most likely to indicate which types of smartphones can be used to connect to the internal IT environment? (D5.3, L5.3.1) a. The CM policy (change management) b. The password policy c. The AUP (acceptable use policy) d. The BYOD policy (bring your own device) - answerThe BYOD policy (bring your own device) Common network device used to connect networks. Server Endpoint Router Switch - answerRouter A common network device used to filter traffic Server Endpoint Ethernet Firewall - answerFirewall endpoint ------ Web server Which port number is associated with the pr

Show more Read less
Institution
ISC Certified In Cybersecurity
Course
ISC Certified in Cybersecurity










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISC Certified in Cybersecurity
Course
ISC Certified in Cybersecurity

Document information

Uploaded on
March 4, 2024
Number of pages
21
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TheStar Florida State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
644
Member since
2 year
Number of followers
180
Documents
25252
Last sold
3 days ago
Stuvia Prodigy

Tested, Verified and Updated Study Materials with 100% Guaranteed Success.

3.8

130 reviews

5
58
4
25
3
25
2
4
1
18

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions