100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

ISC2 – CC Exam with verified detailed solutions

Puntuación
-
Vendido
-
Páginas
21
Grado
A+
Subido en
09-01-2026
Escrito en
2025/2026

ISC2 – CC Exam with verified detailed solutions

Institución
ISC2 Certified In Cybersecurity
Grado
ISC2 Certified in Cybersecurity










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
ISC2 Certified in Cybersecurity
Grado
ISC2 Certified in Cybersecurity

Información del documento

Subido en
9 de enero de 2026
Número de páginas
21
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

2



ISC2 – CC Exam with verified detailed solutions || || || || || || ||




Application Server - ✔✔A computer responsible for hosting applications to user workstations.
|| || || || || || || || || || || ||




NIST SP 800-82 Rev.2
|| || ||




Asymmetric Encryption - ✔✔An algorithm that uses one key to encrypt and a different key to
|| || || || || || || || || || || || || || || ||




decrypt the input plaintext.
|| || ||




Checksum - ✔✔A digit representing the sum of the correct digits in a piece of stored or
|| || || || || || || || || || || || || || || || ||




transmitted digital data, against which later comparisons can be made to detect errors in the data.
|| || || || || || || || || || || || || || ||




Ciphertext - ✔✔The altered form of a plaintext message so it is unreadable for anyone except the
|| || || || || || || || || || || || || || || || ||




intended recipients. In other words, it has been turned into a secret.
|| || || || || || || || || || ||




Classification - ✔✔Classification identifies the degree of harm to the organization, its
|| || || || || || || || || || || ||




stakeholders or others that might result if an information asset is divulged to an unauthorized
|| || || || || || || || || || || || || || ||




person, process or organization. In short, classification is focused first and foremost on
|| || || || || || || || || || || || ||




maintaining the confidentiality of the data, based on the data sensitivity.
|| || || || || || || || || ||




Configuration management - ✔✔A process and discipline used to ensure that the only changes
|| || || || || || || || || || || || || ||




made to a system are those that have been authorized and validated.
|| || || || || || || || || || ||




Cryptanalyst - ✔✔One who performs cryptanalysis which is the study of mathematical
|| || || || || || || || || || || ||




techniques for attempting to defeat cryptographic techniques and/or information systems security.
|| || || || || || || || || || ||




This includes the process of looking for errors or weaknesses in the implementation of an
|| || || || || || || || || || || || || || ||




algorithm or of the algorithm itself.
|| || || || ||




Cryptography - ✔✔The study or applications of methods to secure or protect the meaning and
|| || || || || || || || || || || || || || ||




content of messages, files, or other information, usually by disguise, obscuration, or other
|| || || || || || || || || || || || ||




transformations of that content and meaning. || || || || ||

,2


Data Loss Prevention (DLP) - ✔✔System capabilities designed to detect and prevent the
|| || || || || || || || || || || || ||




unauthorized use and transmission of information. || || || || ||




Decryption - ✔✔The reverse process from encryption. It is the process of converting a ciphertext
|| || || || || || || || || || || || || || ||




message back into plaintext through the use of the cryptographic algorithm and the appropriate
|| || || || || || || || || || || || || ||




key for decryption (which is the same for symmetric encryption, but different for asymmetric
|| || || || || || || || || || || || || ||




encryption). This term is also used interchangeably with the "deciphering." || || || || || || || || ||




Degaussing - ✔✔A technique of erasing data on disk or tape (including video tapes) that, when
|| || || || || || || || || || || || || || || ||




performed properly, ensures that there is insufficient magnetic remanence to reconstruct data.
|| || || || || || || || || || ||




Digital Signature - ✔✔The result of a cryptographic transformation of data which, when properly
|| || || || || || || || || || || || || ||




implemented, provides the services of origin authentication, data integrity, and signer non- || || || || || || || || || || ||




repudiation. NIST SP 800-12 Rev. 1 || || || || ||




Egress Monitoring - ✔✔Monitoring of outgoing network traffic.
|| || || || || || ||




Encryption - ✔✔The process and act of converting the message from its plaintext to ciphertext.
|| || || || || || || || || || || || || || ||




Sometimes it is also referred to as enciphering. The two terms are sometimes used
|| || || || || || || || || || || || || ||




interchangeably in literature and have similar meanings. || || || || || ||




Encryption System - ✔✔The total set of algorithms, processes, hardware, software, and
|| || || || || || || || || || || ||




procedures that taken together provide an encryption and decryption capability.
|| || || || || || || || ||




Hardening - ✔✔A reference to the process of applying secure configurations (to reduce the attack
|| || || || || || || || || || || || || ||




surface) and locking down various hardware, communications systems, and software, including
|| || || || || || || || || || || ||




operating system, web server, application server, application, etc. Hardening is normally
|| || || || || || || || || || ||




performed based on industry guidelines and benchmarks, such as those provided by the Center for
|| || || || || || || || || || || || || ||




Internet Security (CIS).
|| || ||




Hash Function - ✔✔An algorithm that computes a numerical value (called the hash value) on a
|| || || || || || || || || || || || || || || ||




data file or electronic message that is used to represent that file or message and depends on the
|| || || || || || || || || || || || || || || || || ||

, 2


entire contents of the file or message. A hash function can be considered to be a fingerprint of the
|| || || || || || || || || || || || || || || || || || ||




file or message. NIST SP 800-152
|| || || || ||




Hashing - ✔✔The process of using a mathematical algorithm against data to produce a numeric
|| || || || || || || || || || || || || || ||




value that is representative of that data. Source CNSSI 4009-2015
|| || || || || || || || ||




Information Sharing - ✔✔The requirements for information sharing by an IT system with one or || || || || || || || || || || || || || || ||




more other IT systems or applications, for information sharing to support multiple internal or
|| || || || || || || || || || || || || ||




external organizations, missions, or public programs. NIST SP 800-16 || || || || || || || ||




Ingress Monitoring - ✔✔Monitoring of incoming network traffic. || || || || || || ||




Message Digest - ✔✔A digital signature that uniquely identifies data and has the property such
|| || || || || || || || || || || || || || ||




that changing a single bit in the data will cause a completely different message digest to be
|| || || || || || || || || || || || || || || || ||




generated. NISTIR-8011 Vol.3 || ||




Operating System - ✔✔The software "master control application" that runs the computer. It is the|| || || || || || || || || || || || || || ||




first program loaded when the computer is turned on, and its main component, the kernel, resides
|| || || || || || || || || || || || || || || ||




in memory at all times. The operating system sets the standards for all application programs (such
|| || || || || || || || || || || || || || || ||




as the Web server) that run in the computer. The applications communicate with the operating
|| || || || || || || || || || || || || || ||




system for most user interface and file management operations. NIST SP 800-44 Version 2
|| || || || || || || || || || || || ||




Patch - ✔✔A software component that, when installed, directly modifies files or device settings
|| || || || || || || || || || || || || ||




related to a different software component without changing the version number or release details
|| || || || || || || || || || || || || ||




for the related software component. Source: ISO/IEC 19770-2
|| || || || || || ||




Patch Management - ✔✔The systematic notification, identification, deployment, installation and
|| || || || || || || || || ||




verification of operating system and application software code revisions. These revisions are || || || || || || || || || || || ||




known as patches, hot fixes, and service packs. Source: CNSSI 4009
|| || || || || || || || || ||




Plaintext - ✔✔A message or data in its natural format and in readable form; extremely vulnerable
|| || || || || || || || || || || || || || || ||




from a confidentiality perspective.
|| || ||
$18.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Ruiz Liberty University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
84
Miembro desde
1 año
Número de seguidores
1
Documentos
12239
Última venta
3 días hace
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.2

9 reseñas

5
3
4
1
3
2
2
1
1
2

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes