100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

isc2 certified in cyber security Exam with accurate detailed solutions

Rating
-
Sold
-
Pages
41
Grade
A+
Uploaded on
09-01-2026
Written in
2025/2026

isc2 certified in cyber security Exam with accurate detailed solutions

Institution
ISC2 Certified In Cybersecurity
Course
ISC2 Certified in Cybersecurity











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISC2 Certified in Cybersecurity
Course
ISC2 Certified in Cybersecurity

Document information

Uploaded on
January 9, 2026
Number of pages
41
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

2



isc2 certified in cyber security Exam with accurate detailed
|| || || || || || || || ||




solutions


Hashing is often used to provide || || || || ||




Integrity




If two people want to use asymmetric communication to conduct a confidential conversation, how
|| || || || || || || || || || || || ||




many keys fo they need?
|| || || || ||




4




Fill in the missing word: The output of a hashing algorithm is __________.
|| || || || || || || || || || || ||




The same length|| ||




Which one of the following is a benefit of computer-based training (CBT)?
|| || || || || || || || || || ||




Scalable




What is the most crucial element of any security instruction program?
|| || || || || || || || || ||




Preserve health and human safety || || || ||




Fill in the missing word: The organization should keep a copy of every signed Acceptable Use
|| || || || || || || || || || || || || || || ||




Policy (AUP) on file, and issue a copy to _________.
|| || || || || || || || ||




The user who signed it
|| || || ||

,2




Why is the proper alignment of security policy and business goals within the organization
|| || || || || || || || || || || || || ||




important?
Security policy that conflicts with business goals can inhibit productivity
|| || || || || || || || ||




Fill in the missing word: An organization must always be prepared to ________ when applying a
|| || || || || || || || || || || || || || || ||




patch.
Rollback




Fill in the missing word: _____________ is used to ensure that configuration management
|| || || || || || || || || || || || ||




activities are effective and enforced. || || || ||




Verification and audit || ||




Triffid, Inc., wants to host streaming video files for the company's remote users but wants to
|| || || || || || || || || || || || || || || ||




ensure the data is protected while its streaming.
|| || || || || || ||




Which of the following methods are probably best for this purpose?
|| || || || || || || || || ||




Symmetric encryption ||




Dieter wants to send a message to Lupa and wants to be sure that Lupa knows the message has not
|| || || || || || || || || || || || || || || || || || ||




bee modified in transit.
|| || || ||




What technique/tool could Dieter use to assist in this effort?
|| || || || || || || || ||




Hashing

,2




Fill in the missing word: Logs should be reviewed_________________.
|| || || || || || || ||




Continually




Fill in the missing word: Security controls on log data should reflect
|| || || || || || || || || || ||




The Sensitivity of the source device
|| || || || ||




Fill in the missing word: Log data should be kept ________.
|| || || || || || || || || ||




On a device other than where it was captured
|| || || || || || || ||




Fill in the missing word: Data _______ is data left behind on systems/media after normal deletion
|| || || || || || || || || || || || || || || ||




procedures have been attempted. || || ||




Remanence




Fill in the missing word: When data has reached the end of the retention period, it should be
|| || || || || || || || || || || || || || || || || ||




_____________.
Destroyed




Fill in the messing word: Data retention periods apply to ___________ data.
|| || || || || || || || || || ||




all of the answers
|| || ||




|| || ||

, 2




Fill in the missing word: Security needs to be provided to ________data.
|| || || || || || || || || || ||




All of the answers
|| || ||




|| || ||




Every document owned by Triffid, Inc., whether hardcopy or electronic, has a clear, 24-point
|| || || || || || || || || || || || || ||




word at the top and bottom. Only three words can be used: "Sensitive", "Proprietary", and
|| || || || || || || || || || || || || || ||




"Public".
This is an example of _____.
|| || || || ||




Labeling




Fill in the missing word:
|| || || ||




Archiving is typically done when _________. || || || || ||




Data is not needed for regular work purposes
|| || || || || || ||




What type of device is commonly advisable to have on the perimeter between two networks?
|| || || || || || || || || || || || || ||




Firewall




Fill in the missing word:
|| || || ||




An IoT (Internet of Things) device is typified by its effect on or use of the _____ environment.
|| || || || || || || || || || || || || || || || ||




Physical

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ruiz Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
84
Member since
1 year
Number of followers
1
Documents
12239
Last sold
3 days ago
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.2

9 reviews

5
3
4
1
3
2
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions