Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ISC2 Cybersecurity Test with correct answers

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
06-02-2025
Written in
2024/2025

ISC2 Cybersecurity Test with correct answers

Institution
Isc2 Cybersecurity
Course
Isc2 cybersecurity

Content preview

⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪛⪴⪴⪷ ⪱⪘⪞⪴⪸ε ΘΙΙ μλΜιΙ ππππ ιΤΜΜτλ μτΧ




⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷ ⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ




⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷ ⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ




⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷ ⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ




According to the canon "Provide diligent and competent service to principals",
ISC2 professionals are to: - correct answer ✔Avoid apparent or actual conflicts
of interest.


Risk Management is: - correct answer ✔The identification, evaluation and
prioritization of risks.


What is the consequence of a Denial Of Service attack? - correct answer
✔Exhaustion of device resources


In which cloud model does the cloud customer have LESS responsibility over the
infrastructure? - correct answer ✔SaaS (Software as a Service)


The SMTP protocol operates at OSI Level: - correct answer ✔7


Which of these would be the best option if a network administrator needs to
control access to a network? - correct answer ✔NAC


Which security principle states that a user should only have the necessary
permission to execute a task? - correct answer ✔Least Privilege


Which of the following cloud models allows access to fundamental computer
resources? - correct answer ✔Infrastructure as a Service (IaaS) provides the



⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ

,⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪛⪴⪴⪷ ⪱⪘⪞⪴⪸ε ΘΙΙ μλΜιΙ ππππ ιΤΜΜτλ μτΧ




capability to provision processing, storage, networks, and other fundamental
computing resources


Which of these has the PRIMARY objective of identifying and prioritizing critical
business processes? - correct answer ✔Business Impact Analysis


Which access control model specifies access to an object based on the subject's
role in the organization? - correct answer ✔The role-based access control
(RBAC) model is well known for governing access to objects based on the roles
of individual users within the organization.


Which of the following Cybersecurity concepts guarantees that information is
accessible only to those authorized to access it? - correct answer
✔Confidentiality


Which of the following are NOT types of security controls? - correct answer
✔Storage controls


Which port is used to secure communication over the web (HTTPS)? - correct
answer ✔Port 443 is the one reserved for HTTPS connections.


In Change Management, which component addresses the procedures needed to
undo changes? - correct answer ✔Rollback phase addresses the actions to take
when the monitoring change suggests a failure or inadequate performance.


Which type of attack attempts to gain information by observing the device's
power consumption? - correct answer ✔side-channel attack



⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ

, ⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪛⪴⪴⪷ ⪱⪘⪞⪴⪸ε ΘΙΙ μλΜιΙ ππππ ιΤΜΜτλ μτΧ




is a passive and non-invasive attack aiming to extract information from a
running system


Which of the following canons is found in the ISC2 code of ethics? - correct
answer ✔"Provide diligent and competent service to principals" contains the
accurate text of the ISC2 code of ethics.


Which of these is the PRIMARY objective of a Disaster Recovery Plan? - correct
answer ✔Restore company operation to the last-known reliable operation state


Which of these is not an attack against an IP network? - correct answer ✔Side
Channel Attacks are non-invasive attacks that extract information from devices
(typically devices running cryptographic algorithms), and therefore do not aim
at IP networks


Which of the following is NOT a type of learning activity used in Security
Awareness? - correct answer ✔Tutorial
is a form of training, but is not on the list of types of learning activities.


Which are the components of an incident response plan? - correct answer
✔Preparation-> Detection and Analysis -> Containment, Education and Recovery
-> Post Incident Activity


Which type of attack embeds malicious payload inside a reputable or trusted
software? - correct answer ✔Trojans
are a type of software that appears legitimate but has hidden malicious
functions that evade security mechanisms, typically by exploiting legitimate
authorizations of the user that invokes the program.


⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ
⪛⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙ ΙμλΜι Ιππππ ιΤΜΜτλ μτΧ⪛ ⪴⪴⪷⪱⪘ ⪞⪴⪸εΘΙΙμλΜ ιΙππππ ιΤΜΜτλ μτΧ

Written for

Institution
Isc2 cybersecurity
Course
Isc2 cybersecurity

Document information

Uploaded on
February 6, 2025
Number of pages
16
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ruiz Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
93
Member since
1 year
Number of followers
1
Documents
13425
Last sold
2 days ago
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.0

12 reviews

5
4
4
1
3
2
2
1
1
4

Trending documents

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions