ISC2 Cybersecurity Certification (CC) 63 Questions with 100% Correct Answers | Verified | Latest Update
What type of security training is specifically designed to educate employees about attack techniques? - ️️capture the flag Linda's organization recently experienced a social engineering attack. The attacker called a help desk employee and persuaded her that she was a project manager on a tight deadline and locked out of her account. The help desk technician provided the attacker with access to the account. What social engineering principle was used? - ️️urgency What type of phishing attack focuses specifically on senior executives of a targeted organization? - ️️whaling Which one of the following data sanitization strategies is most secure? - ️️destruction Data classifications should be assigned based upon: - ️️sensitivity and criticality If Alice wants to send a message to Bob using symmetric cryptography, what key does she use to encrypt the message? - ️️shared secret key What are the hash lengths from the SHA-2 function? - ️️224, 256, and 512 bits What operation uses a cryptographic key to convert plaintext into ciphertext? - ️️encryption What are the characteristics of cloud computing? - ️️ubiquitous, on-demand, convenient Purchasing server instances and configuring them to run your own software is an example of what cloud deployment model? - ️️Infrastructure as a Service (IaaS)
Written for
- Institution
- ISC2 Cybersecurity Certification
- Course
- ISC2 Cybersecurity Certification
Document information
- Uploaded on
- November 10, 2023
- Number of pages
- 7
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
isc2 cybersecurity certification
Also available in package deal