100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

(ISC)2 Certified in Cybersecurity - Exam Prep Exam Questions And Answers

Rating
-
Sold
-
Pages
80
Grade
A+
Uploaded on
10-09-2024
Written in
2024/2025

(ISC)2 Certified in Cybersecurity - Exam Prep Exam Questions And Answers

Institution
2 Certified In Cybersecurity
Course
2 Certified in Cybersecurity











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
2 Certified in Cybersecurity
Course
2 Certified in Cybersecurity

Document information

Uploaded on
September 10, 2024
Number of pages
80
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

(ISC)2 Certified in Cybersecurity - Exam
Prep Exam Questions And Answers
A system that collects transactional information and stores it in a record
in order to show which users performed which actions is an example of
providing ________. (D1, L1.1.1)




A) Non-repudiation
B) Multifactor authentication
C) Biometrics
D) Privacy - - correct answer ✅A) Non-repudiation


In risk management concepts, a(n) ___________ is something or
someone that poses risk to an organization or asset. (D1, L1.2.1)




A) Fear
B) Threat
C) Control
D) Asset - - correct answer ✅B) Threat


A software firewall is an application that runs on a device and prevents
specific types of traffic from entering that device. This is a type of
________ control. (D1, L1.3.1)

,(ISC)2 Certified in Cybersecurity - Exam
Prep Exam Questions And Answers
A) Physical
B) Administrative
C) Passive
D) Technical - - correct answer ✅D) Technical


Tina is an (ISC)² member and is invited to join an online group of IT
security enthusiasts. After attending a few online sessions, Tina learns
that some participants in the group are sharing malware with each
other, in order to use it against other organizations online. What should
Tina do? (D1, L1.5.1)


A) Nothing
B) Stop participating in the group
C) Report the group to law enforcement
D) Report the group to (ISC)² - - correct answer ✅B) Stop participating
in the group


The city of Grampon wants to ensure that all of its citizens are
protected from malware, so the city council creates a rule that anyone
caught creating and launching malware within the city limits will receive
a fine and go to jail. What kind of rule is this? (D1, L1.4.1)


A) Policy
B) Procedure

,(ISC)2 Certified in Cybersecurity - Exam
Prep Exam Questions And Answers
C) Standard
D) Law - - correct answer ✅D) Law


The Payment Card Industry (PCI) Council is a committee made up of
representatives from major credit card providers (Visa, Mastercard,
American Express) in the United States. The PCI Council issues rules that
merchants must follow if the merchants choose to accept payment via
credit card. These rules describe best practices for securing credit card
processing technology, activities for securing credit card information,
and how to protect customers' personal data. This set of rules is a
_____. (D1, L1.4.2)


A) Law
B) Policy
C) Standard
D) Procedure - - correct answer ✅C) Standard


Aphrodite is a member of (ISC)² and a data analyst for Triffid
Corporation. While Aphrodite is reviewing user log data, Aphrodite
discovers that another Triffid employee is violating the acceptable use
policy and watching streaming videos during work hours. What should
Aphrodite do? (D1, L1.5.1)


A) Inform (ISC)²

, (ISC)2 Certified in Cybersecurity - Exam
Prep Exam Questions And Answers
B) Inform law enforcement
C) Inform Triffid management
D) Nothing - - correct answer ✅C) Inform Triffid management


Triffid Corporation has a rule that all employees working with sensitive
hardcopy documents must put the documents into a safe at the end of
the workday, where they are locked up until the following workday.
What kind of control is the process of putting the documents into the
safe? (D1, L1.3.1)


A) Administrative
B) Tangential
C) Physical
D) Technical - - correct answer ✅A) Administrative


Kerpak works in the security office of a medium-sized entertainment
company. Kerpak is asked to assess a particular threat, and he suggests
that the best way to counter this threat would be to purchase and
implement a particular security solution. This is an example of _______.
(D1, L1.2.2)


A) Acceptance
B) Avoidance
C) Mitigation

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Cindellera stuvia
View profile
Follow You need to be logged in order to follow users or courses
Sold
118
Member since
1 year
Number of followers
2
Documents
11331
Last sold
1 day ago

4.0

24 reviews

5
10
4
6
3
6
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions