ISC
[Link] | FIRST ATTEMPT PASS | [Link]
CC Exam
✅Follow us on: Facebook | Instagram | LinkedIn | reddit | Twitter | Quora | YouTube
Send us your request/inquiry at [Link]@[Link] or connect us for Live Support any time for any certification exam dumps
pdf Or for most asked Interview Q&A PDFs to ensure your success in first try!!
[Link] [Link]
/CLEARCATNET /CLEARCATNET
Get any exam latest real exam questions PDF Now-
✅Visit us - [Link]
✅Mail us- [Link]@[Link]
✅Live Support- [Link]
Questions and Answers PDF 1/248
Question: 1
Which access control is more effective at protecting a door against unauthorized access?
A. Fences
B. Turnstiles
C. Barriers
D. Locks
Answer: D
Explanation:
A lock is a device that prevents a physical structure (typically a door) from being opened, indicating that
only the authorized person (i.e. the person with the key) can open it. A fence or a barrier will prevent ALL
access. Turnstiles are physical barriers that can be easily overcome (after all, it is common knowledge
that intruders can easily jump over a turnstile when no one is watching).
Question: 2
Which type of attack PRIMARILY aims to make a resource inaccessible to its intended users?
A. Phishing
B. Denial of Service
C. Trojans
D. Cross-Site Scripting
Answer: B
Explanation:
A denial of service attack (DoS) consists in compromising the availability of a system or service through
a malicious overload of requests, which causes the activation of safety mechanisms that delay or limit
the availability of that system or service. Due to this, systems or services are rendered inaccessible to
their intended users. Trojans, phishing, and cross-site scripting attacks try to covertly gain access to the
system or data, and therefore do not primarily aim at compromising the system's availability.
Question: 3
Which devices have the PRIMARY objective of collecting and analyzing security events?
A. Firewalls
B. Hubs
C. Routers
D. SIEM
Answer: D
Explanation:
A Security Information and Event Management (SIEM) system is an application that gathers security
data from information system components and presents actionable information through a unified
interface. Routers and Hubs aim to receive and forward traffic. Firewalls filter incoming traffic. Neither of
these last three options aims at collecting and analyzing security events.
Question: 4
[Link] | FIRST ATTEMPT PASS | [Link]
Questions and Answers PDF 2/248
Which access control model specifies access to an object based on the subject's role in the
organization?
A. RBAC
B. MAC
C. ABAC
D. DAC
Answer: A
Explanation:
The role-based access control (RBAC) model is well known for governing access to objects based on
the roles of individual users within the organization. Mandatory access control is based on security
classifications. Attribute-based access control is based on complex attribute rules. In discretionary
access control, subjects can grant privileges to other subjects and change some of the security attributes
of the objects they have access to.
Question: 5
When a company hires an insurance company to mitigate risk, which risk management technique is
being applied?
A. Risk transfer
B. Risk avoidance
C. Risk mitigation
D. Risk tolerance
Answer: A
Explanation:
Risk transfer is a risk management strategy that contractually shifts a pure risk from one party to another
(in this case, to an insurance company). Risk avoidance consists in stopping activities and exposures
that can negatively affect an organization and its assets. Risk mitigation consists of mechanisms to
reduce the risk. Finally, risk tolerance is the degree of risk that an investor is willing to endure.
Question: 6
Which type of attack will most effectively provide privileged access (root access in Unix/Linux platforms)
to a computer while hiding its presence?
A. Rootkits
B. Phishing
C. Cross-Site Scripting
D. Trojans
Answer: A
Explanation:
A rootkit tries to maintain root-level access while concealing malicious activity. It typically creates a
backdoor and attempts to remain undetected by anti-malware software. A rootkit is active while the
system is running. Trojans can also create backdoors but are only active while a specific application is
running, and thus are not as effective as a rootkit. Phishing is used to initiate attacks by redirecting the
user to fake websites. Cross-Site Scripting is used to attack websites.
[Link] | FIRST ATTEMPT PASS | [Link]
Questions and Answers PDF 3/248
Question: 7
Which device is used to connect a LAN to the Internet?
A. Router
B. Firewall
C. HIDS
D. SIEM
Answer: A
Explanation:
A router is a device that acts as a gateway between two or more networks by relaying and directing data
packets between them. A firewall is a device that filters traffic coming from the Internet but does not seek
to distribute traffic. Neither Security Information and Event Management (SIEM) systems nor Host
Intrusion Detection Systems (HIDS) are monitoring devices nor applications that aim at inter-network
connectivity.
Question: 8
How many data labels are considered manageable?
A. 1–2
B. 1
C. 2–3
D. >4
Answer: C
Explanation:
According to data handling and labeling best practices, two or three classifications for data are typically
considered manageable for most organizations. In fact, in the ISC2 Study Guide, Chapter 5, Module 1,
under Data Handling Practices in Labeling, we read that "two or three classifications are manageable,
but more than four tend to be challenging to manage. These classifications could be labels such as
Public, Confidential, and Restricted, each representing a different level of data sensitivity.
For example, in a healthcare organization, patient health information might be labeled "Confidential,"
while general health advice published on the organization's Web site might be labeled "Public. This
labeling system allows the organization to easily identify and manage data based on its sensitivity level,
ensuring that appropriate security measures are in place for each classification.
The principle is that labeling data based on its sensitivity level should be based on a limited,
unambiguous set of labels that correspond to different levels of data sensitivity. The key is to have a
system that differentiates data sensitivity levels without being overly complex to implement and maintain.
Some organizations need more granularity in their data classification, while others are fine with a simpler
system. However, having more than four labels (">4") can make the system overly complex and difficult
to manage, increasing the risk of misclassification and potential data breaches.
Question: 9
In Change Management, which component addresses the procedures needed to undo changes?
A. Request for Approval
B. Rollback
[Link] | FIRST ATTEMPT PASS | [Link]
Questions and Answers PDF 4/248
C. Request for Change
D. Disaster and Recover
Answer: B
Explanation:
In Change Management, the Request For Change (RFC) is the first stage of the request: it formalizes
the change from the stakeholders' point of view. The next phase is the Approval phase, where each
stakeholder reviews the change, identifies and allocates the corresponding resources, and eventually
either approves or rejects the change (appropriately documenting the approval or rejection). Finally, the
Rollback phase addresses the actions to take when the monitoring change suggests a failure or
inadequate performance.
Question: 10
Which of the following is an example of 2FA?
A. One-Time passwords (OTA)
B. Keys
C. Badges
D. Passwords
Answer: A
Explanation:
One-time passwords are typically generated by a device (i.e. "something you have") and are required in
addition to the actual main password (i.e. "something you know"). Badges, keys and passwords with no
other overlapping authentication controls are considered single-factor (and thus are not 2FA).
Question: 11
Which cloud deployment model is suited to companies with similar needs and concerns?
A. Community cloud
B. Private cloud
C. Multi-tenant
D. Hybrid cloud
Answer: A
Explanation:
The correct answer is B. Community cloud deployment models are where several organizations with
similar needs and concerns (technological or regulatory) share the infrastructure and resources of a
cloud environment. This model is attractive because it is cost-effective while addressing the specific
requirements of the participating organizations.
A private cloud is a cloud computing model where the cloud infrastructure is dedicated to a single
organization (and never shared with others). A hybrid cloud is a model that combines (i.e. orchestrates)
on-premises infrastructure, private cloud services, and a public cloud to handle storage and service.
Finally, multitenancy refers to a cloud architecture where multiple cloud tenants (organizations or users)
share the same computing resources. Yet, while resources are shared, each tenant's data is isolated
and remains invisible to other tenants.
Question: 12
[Link] | FIRST ATTEMPT PASS | [Link]
Questions and Answers PDF 5/248
Which of these would be the best option if a network administrator needs to control access to a network?
A. HIDS
B. IDS
C. SIEM
D. NAC
Answer: D
Explanation:
Network Access Control (NAC) refers to a class of mechanisms that prevent access to a network until a
user (or the user's device) either presents the relevant credentials, or passes the results of health checks
performed on the client device. Security Information and Event Management (SIEM), Host Intrusion
Detection Systems (HIDS), and Intrusion Detection Systems (IDS) are all monitoring systems.
Question: 13
In order to find out whether personal tablet devices are allowed in the office, which of the following
policies would be helpful to read?
A. Change Management Policy
B. BYOD
C. Privacy Policy
D. AUP
Answer: B
Explanation:
The Bring Your Own Device (BYOD) policy establishes rules for using personal devices for work-related
activities. The Acceptable Use Policy (AUP) defines the permissions and limitations that users must
agree to while accessing the network and using computer systems or any other organizational
resources. The Privacy Policy (PP) outlines the data security mechanisms that protect customer data. In
the context of Cybersecurity, a Change Management Policy (CMP) establishes the use of standardized
methods to enable IT and process change while minimizing the disruption of services, reducing back-out,
and ensuring clear communication with all of the stakeholders in the organization.
Question: 14
Governments can impose financial penalties as a consequence of breaking a:
A. Regulation
B. Procedure
C. Standard
D. Policy
Answer: A
Explanation:
Standards are created by governing or professional bodies (not by governments themselves). Policies
and procedures are created by organizations, and are therefore not subject to financial penalties (see
ISC2 Study Guide Chapter 1, Module 4)
Question: 15
[Link] | FIRST ATTEMPT PASS | [Link]
Thank you for Trying our Free
Sample Questions
But We Recommend try our Premium Exam Material (Full Premium
PDF) dumps in PDF Format to certain your Guaranteed success in First
Attempt Only.
VISIT US NOW TO DOWNLOAD FULL PDF INSTANTLY 👇
[Link]
Send us your request/inquiry at [Link]@[Link] or connect us for Live Support any time for any certification exam dumps
pdf Or for most asked Interview Q&A PDFs to ensure your success in first try!!
Get any exam latest real exam questions PDF Now- [Link]
/CLEARCATNET
✅Visit us - [Link]
[Link]
✅Mail us- [Link]@[Link]
/CLEARCATNET
✅Live Support- [Link]