Derrick logs on to a system in order to read a file. In this example, Derrick is the ______?
Which access control model grants permissions based ondata sensitivityanduser job functions?
A method for risk analysis that is based on the assignment of a descriptor such as low, medium, or high.
Which authentication enables automatic identification across multiple service providers?
Why is the recovery of IT often crucial to the recovery and sustainment of business operations?
A one-way spinning door or barrier that allows only one person at a time to enter a building or area.
Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?
Which element of the security policy framework includes recommendations that are NOT binding?
A company network experiences a sudden flood of network packets that causes major slowdown in Internet traffic. What type of event is this?
Dylan is creating a cloud architecture that requires connections between systems in two different private VPCs. What is the BEST way to enable this access?
Which one of the following groups is NOT normally part of an organization's cybersecurity incident response team?
Which TLS extension is used to optimize the TLS handshake process by reducing the number of round trips between the client and server?
Which zero-trust component breaks LANs into very small, localized security zones?
An event that jeopardizes confidentiality, integrity, or availability is called:
An agreement between a cloud service provider and a customer based on cloud-specific terms is called:
Which of the following is unlikely to be a member of the disaster recovery team?
An attacker places themselves between two communicating devices is known as:
What is the difference between Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)?
An approach using software-based controllers and APIs to direct network traffic:
An analysis of system requirements and interdependencies used to prioritize recovery is known as:
An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant is known as:
_______ are virtual separations within a switch used mainly to limit broadcast traffic.
A structured approach used to oversee and manage risk for an enterprise is called:
When the ISC2 mail server sends mail to other mail servers, it becomes a —?
David's team recently implemented a new system that gathers information from a variety of different log sources, analyzes that information, and then triggers automated playbooks in response to security events. What term BEST describes this technology?
The prevention of authorized access to resources or the delaying of time-critical operations is known as:
What is the primary goal of Identity and Access Management (IAM) in cybersecurity?
You experienced a power outage that disrupted access to your data center. What type of security concern occurred?
David is worried about distributed denial-of-service (DDoS) attacks against his company’s primary web application. Which option will provide the MOST resilience against large-scale DDoS attacks?
Mark has purchased a Mac laptop. He is scared of losing his screen and is planning to buy an insurance policy. Which risk management strategy is this?
The harmonization of automated computing tasks into reusable workflows is called:
What cybersecurity principle focuses on granting users only the privileges necessary to perform their job functions?
Who is responsible for publishing and signing the organization’s policies?
Which principle states that users should have access only to the specific data and resources needed to perform required tasks?
Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?
Which of the following does NOT normally influence an organization’s log retention policy?
Malicious code that acts like a remotely controlled “robot” for an attacker.
Limiting access based on data sensitivity and user authorization is known as:
What kind of control is it when we add a backup firewall that takes over if the main one stops working?
A company wants to prevent employees from bringing unauthorized electronic devices into the workspace. Which physical control is best?
What is the focus of disaster recovery planning after a data center failure?
Information should be consistently and readily accessible for authorized parties.
Which phase of the access control process (AAA) does a user prove his/her identity?
A centralized organizational function that monitors, detects, and analyzes security events to prevent disruptions is called:
Which term describes a communication tunnel that provides point-to-point transmission of authentication and data traffic over an untrusted network?
Which attack most effectively maintains remote access and control over a victim’s computer?
Activities necessary to restore IT and communications services are known as:
What goal of security is enhanced by a strong business continuity program?
Which type of database combines related records and fields into a logical tree structure?
Which technology should be implemented to increase the work effort required for buffer overflow attacks?
Which ensures maintaining business operations during or after an incident?
Natalia is concerned that users on her network may be storing sensitive information, such as Social Security numbers, on their hard drives without proper authorization or security controls. What third-party security service can she implement to best detect this activity?
Which penetration testing technique requires the team to do the MOST work and effort?
The common term for systems that control temperature and humidity in a data center is:
The prevention of authorized access to resources or delaying time-critical operations is known as:
During an ISC2 CC exam, you observe another candidate cheating. What should you do?
Created by switches to logically segment a network without changing physical topology:
An organization develops procedures to restore critical business processes after a major disruption. What plan is this?
Embedded systems and network-enabled devices that communicate with the Internet are:
Which provides integrity services that allow a recipient to verify that a message has not been altered?
Networks that are heavily microsegmented with firewalls at connection points are characteristic of:
A company experiences a major IT outage and cannot perform critical business functions. Which plan helps recovery?
Which of the following is NOT an element of system security configuration management?
Which allows extremely granular restrictions down to individual machines or users?
Shaun is planning to protect data in all states (at rest, in motion, and in use), defending against data leakage. What is the BEST solution to implement?
Which document provides a high-level overview of a Disaster Recovery Plan?