100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ISC2 Pre-Course Assessment 2023 with complete solution

Rating
-
Sold
-
Pages
6
Grade
A
Uploaded on
14-08-2023
Written in
2023/2024

ISC2 Pre-Course Assessment 2023 with complete solution Steve is a security practitioner assigned to come up with a protective measure for ensuring cars don't collide with pedestrians. What is probably the most effective type of control for this task? Physical A system that collects transactional information and stores it in a record in order to show which users performed which actions is an example of providing ________. Non-repudiation Of the following, which would probably not be considered a threat? A laptop with sensitive data on it The city of Grampon wants to know where all its public vehicles (garbage trucks, police cars, etc.) are at all times, so the city has GPS transmitters installed in all the vehicles. What kind of control is this? Technical Guillermo logs onto a system and opens a document file. In this example, Guillermo is: The subject Gary is unable to log in to the production environment. Gary tries three times and is then locked out of trying again for one hour. Why? Gary's actions look like an attack Which type of fire-suppression system is typically the least expensive? Water An IoT (Internet of Things) device is typified by its effect on or use of the _____ environment. Physical The concept that the deployment of multiple types of controls provides better security than using a single type of control. Defense in depth Zarma is an (ISC)² member and a security analyst for Triffid Corporation. One of Zarma's colleagues is interested in getting an (ISC)2 certification and asks Zarma what the test questions are like. What should Zarma do? Explain the style and format of the questions, but no detail (ISC)² publishes a Common Body of Knowledge (CBK) that IT security practitioners should be familiar with; this is recognized throughout the industry as a set of material that is useful for practitioners to refer to. Certifications can be issued for demonstrating expertise in this Common Body of Knowledge. What kind of document is the Common Body of Knowledge? Standard Hoshi is an (ISC)2 member who works for the Triffid Corporation as a data manager. Triffid needs a new firewall solution, and Hoshi is asked to recommend a product for Triffid to acquire and implement. Hoshi's cousin works for a firewall vendor; that vendor happens to make the best firewall available. What should Hoshi do? disclose the relationship, but recommend the vendor/product

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
August 14, 2023
Number of pages
6
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISC2 Pre-Course Assessment 2023 with complete solution
Steve is a security practitioner assigned to come up with a protective measure for
ensuring cars don't collide with pedestrians. What is probably the most effective
type of control for this task?
Physical
A system that collects transactional information and stores it in a record in order
to show which users performed which actions is an example of providing
________.
Non-repudiation
Of the following, which would probably not be considered a threat?
A laptop with sensitive data on it
The city of Grampon wants to know where all its public vehicles (garbage trucks,
police cars, etc.) are at all times, so the city has GPS transmitters installed in all
the vehicles. What kind of control is this?
Technical
Guillermo logs onto a system and opens a document file. In this example,
Guillermo is:
The subject
Gary is unable to log in to the production environment. Gary tries three times and
is then locked out of trying again for one hour. Why?
Gary's actions look like an attack
Which type of fire-suppression system is typically the least expensive?
Water
An IoT (Internet of Things) device is typified by its effect on or use of the _____
environment.
Physical
The concept that the deployment of multiple types of controls provides better
security than using a single type of control.
Defense in depth
Zarma is an (ISC)² member and a security analyst for Triffid Corporation. One of
Zarma's colleagues is interested in getting an (ISC)2 certification and asks Zarma
what the test questions are like. What should Zarma do?
Explain the style and format of the questions, but no detail
(ISC)² publishes a Common Body of Knowledge (CBK) that IT security
practitioners should be familiar with; this is recognized throughout the industry
as a set of material that is useful for practitioners to refer to. Certifications can be
issued for demonstrating expertise in this Common Body of Knowledge. What
kind of document is the Common Body of Knowledge?
Standard
Hoshi is an (ISC)2 member who works for the Triffid Corporation as a data
manager. Triffid needs a new firewall solution, and Hoshi is asked to recommend
a product for Triffid to acquire and implement. Hoshi's cousin works for a firewall
vendor; that vendor happens to make the best firewall available. What should
Hoshi do?
disclose the relationship, but recommend the vendor/product

, Sophia is visiting Las Vegas and decides to put a bet on a particular number on a
roulette wheel. This is an example of _________.
Acceptance
In risk management concepts, a(n) _________ is something a security practitioner
might need to protect.
Asset
A _____ is a record of something that has occurred.
Log
Prachi works as a database administrator for Triffid, Inc. Prachi is allowed to add
or delete users, but is not allowed to read or modify the data in the database
itself. When Prachi logs onto the system, an access control list (ACL) checks to
determine which permissions Prachi has.
In this situation, what is the database?
The object
Larry and Fern both work in the data center. In order to enter the data center to
begin their workday, they must both present their own keys (which are different)
to the key reader, before the door to the data center opens.
Which security concept is being applied in this situation?
Dual control
All of the following are typically perceived as drawbacks to biometric systems,
except:
Lack of accuracy
Which of the following is one of the common ways potential attacks are often
identified?
Users report unusual systems activity/response to Help Desk or the security office
The section of the IT environment that is closest to the external world; where we
locate IT systems that communicate with the Internet.
DMZ (demilitarized zone)
The logical address of a device connected to the network or Internet.
Internet Protocol (IP) address
Which of the following activities is usually part of the configuration management
process, but is also extremely helpful in countering potential attacks?
Updating and patching systems
Which common cloud deployment model typically features only a single
customer's data/functionality stored on specific systems/hardware?
Private
Triffid, Inc., has many remote workers who use their own IT devices to process
Triffid's information. The Triffid security team wants to deploy some sort of
sensor on user devices in order to recognize and identify potential security
issues. Which of the following is probably most appropriate for this specific
purpose?
HIDS (host-based intrusion-detection systems)
Triffid, Inc., has deployed anti-malware solutions across its internal IT
environment. What is an additional task necessary to ensure this control will
function properly?
Update the anti-malware solution regularly

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
magdamwikash23 Western Governers University
Follow You need to be logged in order to follow users or courses
Sold
112
Member since
2 year
Number of followers
94
Documents
5329
Last sold
2 days ago
Magda

NURSING STUDY GUIDES/EXAMS AND NOTES ALL VERIFIED BY EXPERTS All my uploaded documents, exams and essays are verified by relevant experts.I can assure an A or at least 90% if you use any of my documents.

3.9

14 reviews

5
7
4
2
3
2
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions