100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ISC Certified in Cybersecurity Complete Questions with 100% Correct Answers Graded A+ $12.39   Add to cart

Exam (elaborations)

ISC Certified in Cybersecurity Complete Questions with 100% Correct Answers Graded A+

 7 views  0 purchase
  • Course
  • Institution

ISC Certified in Cybersecurity Complete Questions with 100% Correct Answers Which of the following can be used to map data flows through an organization and the relevant security controls used at each point along the way? (D5.1, L5.1.1) a. Encryption b. Hashing c. Hard Copy d. Data Life Cycle ...

[Show more]

Preview 3 out of 17  pages

  • April 18, 2024
  • 17
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
ISC Certified in Cybersecurity Complete
Questions with 100% Correct Answers
Which of the following can be used to map data flows through an organization and the relevant
security controls used at each point along the way? (D5.1, L5.1.1)
a. Encryption
b. Hashing
c. Hard Copy
d. Data Life Cycle
Data Life Cycle


Why is an asset inventory so important?
a. It tells you what to encrypt
b. You can't protect what you don't know you have
c. The law requires it
d. It contains a price list
You can't protect what you don't know you have


Who is responsible for publishing and signing the organization's policies? (D5.3, L5.3.1)
a. Security office
b. Human Resources
c. Senior Management
d. Legal Department
Senior Mangagement


Which of the following is always true about logging? (D5.1, L5.1.3)
a. Logs should be very detailed
b. Logs should be in English
c. Logs should be concise
d. Logs should be stored separately from the systems they're logging
Logs should be stored separately from the systems they're logging


A mode of encryption for ensuring confidentiality efficiently, with a minimum amount of processing
overhead (D5.1, L5.1.3)
a. Asymmetric
b. Symmetric
c. Hashing
d. Covert
Symmetric


A ready visual cue to let anyone in contact with the data know what the classification is. (D5.1, L5.1.1)
a. Encryption
b. Label
c. Graphics
d. Photos
Label


A set of security controls or system settings used to ensure uniformity of configuration throughout
the IT environment. (D5.2, L5.2.1)
a. Patches

,b. Inventory
c. Baseline
d. Policy
Baseline


What is the most important aspect of security awareness/training? (D5.4, L5.4.1)
a. Protecting assets
b. Maximizing business capabilities
c. Ensuring the confidentiality of data
d. Protecting health and human safety
Protecting health and human safety


Which entity is most likely to be tasked with monitoring and enforcing security policy? (D5.3, L5.3.1)
a. The Human Resources Office
b. The legal department
c. Regulators
d. The security office
The security office


Which organizational policy is most likely to indicate which types of smartphones can be used to
connect to the internal IT environment? (D5.3, L5.3.1)
a. The CM policy (change management)
b. The password policy
c. The AUP (acceptable use policy)
d. The BYOD policy (bring your own device)
The BYOD policy (bring your own device)


Common network device used to connect networks.
Server
Endpoint
Router
Switch
Router


A common network device used to filter traffic
Server
Endpoint
Ethernet
Firewall
Firewall


endpoint <------> Web server
Which port number is associated with the protocol typically used in this connection? (D 4.1 L4.1.2)
21
53
80
161
80

, An attack against the availability of a network/system, typically uses many attacking machines to
direct traffic against a given target. (D4.2 L4.2.1)
Worm
Virus
Stealth
DDoS
DDoS


A security solution installed on an endpoint in order to detect potentially anomalous activity. (D4.2
L4.2.2)
Router
Host-Based Intrusion Prevention System
Switch
Security incident and event management system (SIEM)
Host-Based Intrusion Prevention System


A security solution that detects, identifies and often quarantines potentially hostile software. (D4.2,
L4.2.2)
Firewall
Guard
Camera
Anti-Malware
Anti-Malware


The common term used to describe the mechanisms that control the temperature and humidity in a
data center. (D4.3 L4.3.1)
VLAN (virtual local area network)
HVAC (heating, ventilation and air conditioning)
STAT (system temperature and timing)
TAWC (temperature and water control)
HVAC (heating, ventilation and air conditioning)


A cloud arrangement whereby the provider owns and manages the hardware, operating system, and
applications in the cloud, and the customer owns the data. (D4.3 L4.3.2)
Infrastructure as a service (IaaS)
Morphing as a service (MaaS)
Platform as a service (PaaS)
Software as a service (SaaS)
Software as a service (SaaS)


A portion of the organization's network that interfaces directly with the outside world, typically, this
exposed area has more security controls and restrictions than the rest of the internal IT environment.
(D4.3 L4.3.3)
National Institute of Standards and Technology (NIST)
Demilitarized Zone (DMZ)
Virtual Private Network (VPN)
Virtual Local Area Network (VLAN)
Demilitarized Zone (DMZ)


Which of the following tools can be used to grant remote users access to the internal IT environment?
(D 4.3 L4.3.3)

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.39. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


$12.39
  • (0)
  Add to cart