Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISC2 Certified In Cybersecurity Exam with precise detailed solutions

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
09-01-2026
Geschreven in
2025/2026

ISC2 Certified In Cybersecurity Exam with precise detailed solutions

Instelling
ISC2 Certified In Cybersecurity
Vak
ISC2 Certified in Cybersecurity

Voorbeeld van de inhoud

2



ISC2 Certified In Cybersecurity Exam with precise detailed
|| || || || || || || ||




solutions


Which of the following involves a sophisticated attack in which a hacker maintains a stealthy long
|| || || || || || || || || || || || || || ||




term presence in the victim's network? - ✔✔Advanced Persistent Threat
|| || || || || || || || || ||




Which of the following is an example of a technical control? - ✔✔Antivirus
|| || || || || || || || || || || ||




Which of the following is not an example of protecting data-in-transit? - ✔✔Database Encryption
|| || || || || || || || || || || || ||




A data center technician needs to securely dispose of several hard drives for systems that are
|| || || || || || || || || || || || || || || ||




being decommissioned. What technique is not sufficient to ensue the data is not recoverable? -
|| || || || || || || || || || || || || || ||




✔✔Erasure



A security engineer is trying to decide on the best course of action to take to block internet traffic
|| || || || || || || || || || || || || || || || || || ||




from specific IP addresses at the perimeter of the company network. which of the following
|| || || || || || || || || || || || || || ||




controls would allow the security engineer to configure such rules? - ✔✔Network Firewall
|| || || || || || || || || || || ||




Which access control is common used in military and government environments to protect
|| || || || || || || || || || || || ||




classified information? - ✔✔Mandatory Access Control (MAC)
|| || || || || ||




Which method of authentication provides the strongest security? - ✔✔Dual-Factor
|| || || || || || || || ||




Mary is conducting a risk analysis for her organization. Her boss, the CISO, feels strongly that the
|| || || || || || || || || || || || || || || ||




organization's biggest risk is from hackers trying to steal intellectual property from their
|| || || || || || || || || || || || || ||




engineering database server so that is where their defensive focus should lie. this is an example of
|| || || || || || || || || || || || || || || || ||




what kind of analysis? - ✔✔Qualitative Risk Analysis
|| || || || || || ||




Which of the following best represents the process for security risk management? - ✔✔Risk
|| || || || || || || || || || || || || ||




Identification, assessment, treatment || ||

, 2




Of the job titles listed, which is most likely to be responsible for risk management if the
|| || || || || || || || || || || || || || || || ||




organization does not have a CISOL or Risk Officer? - ✔✔Chief Financial Officer || || || || || || || || || || || ||




Which of the following terms describes the output of information that is run through a hash
|| || || || || || || || || || || || || || || ||




function? - ✔✔Message Digest || || ||




Which cloud service model gives customers access to platforms where they can develop, test, and
|| || || || || || || || || || || || || || ||




run code for applications in various programming languages? - ✔✔Platform as a Service (PaaS)
|| || || || || || || || || || || || ||




Which of the following cryptographic techniques cannot be used to provide confidentiality
|| || || || || || || || || || || ||




protection to a message? - ✔✔Hasing || || || || ||




Which of the following items best describes the principle of confidentiality? - ✔✔Confidentiality
|| || || || || || || || || || || || ||




ensures data is kept secret and not disclosed to unauthorized parties.
|| || || || || || || || || ||




Stealing data (exfiltration) is an example of a breach of what property? - ✔✔Confidentiality
|| || || || || || || || || || || || ||




When it comes to physical security, what is the most important consideration? - ✔✔Ensure the
|| || || || || || || || || || || || || || ||




safety of personnel from harm
|| || || ||




Which phase of the incident response process involves bringing systems and data back to normal
|| || || || || || || || || || || || || || ||




operation? - ✔✔Containment, Eradication, and Recovery || || || || ||




Which of the following best represents activities typically included in the patch management
|| || || || || || || || || || || || ||




lifecycle? - ✔✔Asset discovery, Vulnerability discovery, Patch acquisition, Patch Validation,
|| || || || || || || || || ||




Patch deployment, reporting
|| ||




Bob and Alice share a job. To prevent fraud, Bob performs part A and Alice performs part B, but
|| || || || || || || || || || || || || || || || || || ||




because of their account privileges, neither Bob nor Alice can perform the other's part. This is an
|| || || || || || || || || || || || || || || || ||




example of what concept? - ✔✔Segregation of duties || || || || || || ||

Geschreven voor

Instelling
ISC2 Certified in Cybersecurity
Vak
ISC2 Certified in Cybersecurity

Documentinformatie

Geüpload op
9 januari 2026
Aantal pagina's
7
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$16.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Ruiz Liberty University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
93
Lid sinds
1 jaar
Aantal volgers
1
Documenten
13425
Laatst verkocht
4 dagen geleden
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.0

12 beoordelingen

5
4
4
1
3
2
2
1
1
4

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen