100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

(ISC)2 Certified in Cybersecurity - Exam Prep with correct answers 100% 2025

Rating
-
Sold
-
Pages
94
Grade
A+
Uploaded on
15-09-2025
Written in
2025/2026

(ISC)2 Certified in Cybersecurity - Exam Prep with correct answers 100% 2025 Document specific requirements that a customer has about any aspect of a vendor's service performance. A) DLR B) Contract C) SLR D) NDA - Correct Answer C) SLR (Service-Level Requirements) _________ identifies and triages risks. - Correct Answer Risk Assessment _________ are external forces that jeopardize security. - Correct Answer Threats _________ are methods used by attackers. - Correct Answer Threat Vectors _________ are the combination of a threat and a vulnerability. - Correct Answer Risks We rank risks by _________ and _________. - Correct Answer Likelihood and impact _________ use subjective ratings to evaluate risk likelihood and impact. - Correct Answer Qualitative Risk Assessment _________ use objective numeric ratings to evaluate risk likelihood and impact. - Correct Answer Quantitative Risk Assessment _________ analyzes and implements possible responses to control risk. - Correct Answer Risk Treatment _________ changes business practices to make a risk irrelevant. - Correct Answer Risk Avoidance _________ reduces the likelihood or impact of a risk. - Correct Answer Risk Mitigation An organization's _________ is the set of risks that it faces. - Correct Answer Risk Profile _________ Initial Risk of an organization. - Correct Answer Inherent Risk _________ Risk that remains in an organization after controls. - Correct Answer Residual Risk _________ is the level of risk an organization is willing to accept. - Correct Answer Risk Tolerance _________ reduce the likelihood or impact of a risk and help identify issues. - Correct Answer Security Controls _________ stop a security issue from occurring. - Correct Answer Preventive Control _________ identify security issues requiring investigation. - Correct Answer Detective Control _________ remediate security issues that have occurred. - Correct Answer Recovery Control

Show more Read less
Institution
2 Certified In Cybersecurity
Course
2 Certified in Cybersecurity











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
2 Certified in Cybersecurity
Course
2 Certified in Cybersecurity

Document information

Uploaded on
September 15, 2025
Number of pages
94
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

(ISC)2 Certified in Cybersecurity -
Exam Prep with correct answers 100%
2025
Document specific requirements that a customer has about any aspect of a vendor's service
performance.



A) DLR

B) Contract

C) SLR

D) NDA - Correct Answer C) SLR (Service-Level Requirements)



_________ identifies and triages risks. - Correct Answer Risk Assessment



_________ are external forces that jeopardize security. - Correct Answer Threats



_________ are methods used by attackers. - Correct Answer Threat Vectors



_________ are the combination of a threat and a vulnerability. - Correct Answer Risks



We rank risks by _________ and _________. - Correct Answer Likelihood and impact



_________ use subjective ratings to evaluate risk likelihood and impact. - Correct Answer Qualitative
Risk Assessment



_________ use objective numeric ratings to evaluate risk likelihood and impact. - Correct Answer
Quantitative Risk Assessment



_________ analyzes and implements possible responses to control risk. - Correct Answer Risk Treatment

,_________ changes business practices to make a risk irrelevant. - Correct Answer Risk Avoidance



_________ reduces the likelihood or impact of a risk. - Correct Answer Risk Mitigation



An organization's _________ is the set of risks that it faces. - Correct Answer Risk Profile



_________ Initial Risk of an organization. - Correct Answer Inherent Risk



_________ Risk that remains in an organization after controls. - Correct Answer Residual Risk



_________ is the level of risk an organization is willing to accept. - Correct Answer Risk Tolerance



_________ reduce the likelihood or impact of a risk and help identify issues. - Correct Answer Security
Controls



_________ stop a security issue from occurring. - Correct Answer Preventive Control



_________ identify security issues requiring investigation. - Correct Answer Detective Control



_________ remediate security issues that have occurred. - Correct Answer Recovery Control



Hardening == Preventative - Correct Answer Virus == Detective



Backups == Recovery - Correct Answer For exam (Local and Technical Controls are the same)



_________ use technology to achieve control objectives. - Correct Answer Technical Controls



_________ use processes to achieve control objectives. - Correct Answer Administrative Controls

,_________ impact the physical world. - Correct Answer Physical Controls



_________ tracks specific device settings. - Correct Answer Configuration Management



_________ provide a configuration snapshot. - Correct Answer Baselines (track changes)



_________ assigns numbers to each version. - Correct Answer Versioning



_________ serve as important configuration artifacts. - Correct Answer Diagrams



_________ and _________ help ensure a stable operating environment. - Correct Answer Change and
Configuration Management



Purchasing an insurance policy is an example of which risk management strategy? - Correct Answer Risk
Transference



What two factors are used to evaluate a risk? - Correct Answer Likelihood and Impact



What term best describes making a snapshot of a system or application at a point in time for later
comparison? - Correct Answer Baselining



What type of security control is designed to stop a security issue from occurring in the first place? -
Correct Answer Preventive



What term describes risks that originate inside the organization? - Correct Answer Internal



What four items belong to the security policy framework? - Correct Answer Policies, Standards,
Guidelines, Procedures



_________ describe an organization's security expectations. - Correct Answer Policies (mandatory and
approved at the highest level of an organization)

, _________ describe specific security controls and are often derived from policies. - Correct Answer
Standards (mandatory)



_________ describe best practices. - Correct Answer Guidelines (recommendations/advice and
compliance is not mandatory)



_________ step-by-step instructions. - Correct Answer Procedures (not mandatory)



_________ describe authorized uses of technology. - Correct Answer Acceptable Use Policies (AUP)



_________ describe how to protect sensitive information. - Correct Answer Data Handling Policies



_________ cover password security practices. - Correct Answer Password Policies



_________ cover use of personal devices with company information. - Correct Answer Bring Your Own
Device (BYOD) Policies



_________ cover the use of personally identifiable information. - Correct Answer Privacy Policies



_________ cover the documentation, approval, and rollback of technology changes. - Correct Answer
Change Management Policies



Which element of the security policy framework includes suggestions that are not mandatory? - Correct
Answer Guidelines



What law applies to the use of personal information belonging to European Union residents? - Correct
Answer GDPR



What type of security policy normally describes how users may access business information with their
own devices? - Correct Answer BYOD Policy

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PROFFESORMAURINE West Virgina University
View profile
Follow You need to be logged in order to follow users or courses
Sold
15
Member since
2 year
Number of followers
3
Documents
1019
Last sold
4 days ago
NURSING

this i a trusted platform you can get all NURSING EXAMS s and correct answers and the prices are affordable they are clear and can be depended on without any inconveniences 100 % . You can trust me and be sure to get 100% good notes and clear ones during your exam

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions