100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

(ISC)2 Certified in Cybersecurity - Exam Prep 2025 With 100% Correct Answers

Rating
-
Sold
-
Pages
108
Grade
A+
Uploaded on
16-08-2025
Written in
2025/2026

Document specific requirements that a customer has about any aspect of a vendor's service performance. A) DLR B) Contract C) SLR D) NDA - CORRECT ANSWERC) SLR (Service-Level Requirements) _________ identifies and triages risks. - CORRECT ANSWERRisk Assessment _________ are external forces that jeopardize security. - CORRECT ANSWERThreats _________ are methods used by attackers. - CORRECT ANSWERThreat Vectors _________ are the combination of a threat and a vulnerability. - CORRECT ANSWERRisks We rank risks by _________ and _________. - CORRECT ANSWERLikelihood and impact _________ use subjective ratings to evaluate risk likelihood and impact. - CORRECT ANSWERQualitative Risk Assessment

Show more Read less
Institution
2 Certified In Cybersecurity
Course
2 Certified in Cybersecurity











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
2 Certified in Cybersecurity
Course
2 Certified in Cybersecurity

Document information

Uploaded on
August 16, 2025
Number of pages
108
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

(ISC)2 Certified in Cybersecurity -
Exam Prep 2025 With 100% Correct
Answers

Document specific requirements that a customer has about any aspect of a vendor's service
performance.



A) DLR

B) Contract

C) SLR

D) NDA - CORRECT ANSWER✔✔C) SLR (Service-Level Requirements)



_________ identifies and triages risks. - CORRECT ANSWER✔✔Risk Assessment



_________ are external forces that jeopardize security. - CORRECT ANSWER✔✔Threats



_________ are methods used by attackers. - CORRECT ANSWER✔✔Threat Vectors



_________ are the combination of a threat and a vulnerability. - CORRECT ANSWER✔✔Risks



We rank risks by _________ and _________. - CORRECT ANSWER✔✔Likelihood and impact



_________ use subjective ratings to evaluate risk likelihood and impact. - CORRECT
ANSWER✔✔Qualitative Risk Assessment

,_________ use objective numeric ratings to evaluate risk likelihood and impact. - CORRECT
ANSWER✔✔Quantitative Risk Assessment



_________ analyzes and implements possible responses to control risk. - CORRECT
ANSWER✔✔Risk Treatment



_________ changes business practices to make a risk irrelevant. - CORRECT ANSWER✔✔Risk
Avoidance



_________ reduces the likelihood or impact of a risk. - CORRECT ANSWER✔✔Risk Mitigation



An organization's _________ is the set of risks that it faces. - CORRECT ANSWER✔✔Risk Profile



_________ Initial Risk of an organization. - CORRECT ANSWER✔✔Inherent Risk



_________ Risk that remains in an organization after controls. - CORRECT ANSWER✔✔Residual
Risk



_________ is the level of risk an organization is willing to accept. - CORRECT ANSWER✔✔Risk
Tolerance



_________ reduce the likelihood or impact of a risk and help identify issues. - CORRECT
ANSWER✔✔Security Controls



_________ stop a security issue from occurring. - CORRECT ANSWER✔✔Preventive Control



_________ identify security issues requiring investigation. - CORRECT ANSWER✔✔Detective
Control

,_________ remediate security issues that have occurred. - CORRECT ANSWER✔✔Recovery
Control



Hardening == Preventative - CORRECT ANSWER✔✔Virus == Detective



Backups == Recovery - CORRECT ANSWER✔✔For exam (Local and Technical Controls are the
same)



_________ use technology to achieve control objectives. - CORRECT ANSWER✔✔Technical
Controls



_________ use processes to achieve control objectives. - CORRECT ANSWER✔✔Administrative
Controls



_________ impact the physical world. - CORRECT ANSWER✔✔Physical Controls



_________ tracks specific device settings. - CORRECT ANSWER✔✔Configuration Management



_________ provide a configuration snapshot. - CORRECT ANSWER✔✔Baselines (track changes)



_________ assigns numbers to each version. - CORRECT ANSWER✔✔Versioning



_________ serve as important configuration artifacts. - CORRECT ANSWER✔✔Diagrams



_________ and _________ help ensure a stable operating environment. - CORRECT
ANSWER✔✔Change and Configuration Management

, Purchasing an insurance policy is an example of which risk management strategy? - CORRECT
ANSWER✔✔Risk Transference



What two factors are used to evaluate a risk? - CORRECT ANSWER✔✔Likelihood and Impact



What term best describes making a snapshot of a system or application at a point in time for
later comparison? - CORRECT ANSWER✔✔Baselining



What type of security control is designed to stop a security issue from occurring in the first
place? - CORRECT ANSWER✔✔Preventive



What term describes risks that originate inside the organization? - CORRECT
ANSWER✔✔Internal



What four items belong to the security policy framework? - CORRECT ANSWER✔✔Policies,
Standards, Guidelines, Procedures



_________ describe an organization's security expectations. - CORRECT ANSWER✔✔Policies
(mandatory and approved at the highest level of an organization)



_________ describe specific security controls and are often derived from policies. - CORRECT
ANSWER✔✔Standards (mandatory)



_________ describe best practices. - CORRECT ANSWER✔✔Guidelines
(recommendations/advice and compliance is not mandatory)



_________ step-by-step instructions. - CORRECT ANSWER✔✔Procedures (not mandatory)

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUILLSKY Yale University
View profile
Follow You need to be logged in order to follow users or courses
Sold
513
Member since
3 year
Number of followers
275
Documents
13973
Last sold
1 month ago
,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS IS THE KEY TO STUDENTS CAREER EXCELLENCE!!!

On this page, you find all documents, package deals, and flashcards offered by seller MAXGRADES WELCOME TO MAXGRADES ALL THE BEST !!!!!!

3.6

129 reviews

5
49
4
23
3
29
2
6
1
22

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions