2
isc2 certified in cyber security Exam with accurate detailed
|| || || || || || || || ||
solutions
Hashing is often used to provide || || || || ||
Integrity
If two people want to use asymmetric communication to conduct a confidential conversation, how
|| || || || || || || || || || || || ||
many keys fo they need?
|| || || || ||
4
Fill in the missing word: The output of a hashing algorithm is __________.
|| || || || || || || || || || || ||
The same length|| ||
Which one of the following is a benefit of computer-based training (CBT)?
|| || || || || || || || || || ||
Scalable
What is the most crucial element of any security instruction program?
|| || || || || || || || || ||
Preserve health and human safety || || || ||
Fill in the missing word: The organization should keep a copy of every signed Acceptable Use
|| || || || || || || || || || || || || || || ||
Policy (AUP) on file, and issue a copy to _________.
|| || || || || || || || ||
The user who signed it
|| || || ||
,2
Why is the proper alignment of security policy and business goals within the organization
|| || || || || || || || || || || || || ||
important?
Security policy that conflicts with business goals can inhibit productivity
|| || || || || || || || ||
Fill in the missing word: An organization must always be prepared to ________ when applying a
|| || || || || || || || || || || || || || || ||
patch.
Rollback
Fill in the missing word: _____________ is used to ensure that configuration management
|| || || || || || || || || || || || ||
activities are effective and enforced. || || || ||
Verification and audit || ||
Triffid, Inc., wants to host streaming video files for the company's remote users but wants to
|| || || || || || || || || || || || || || || ||
ensure the data is protected while its streaming.
|| || || || || || ||
Which of the following methods are probably best for this purpose?
|| || || || || || || || || ||
Symmetric encryption ||
Dieter wants to send a message to Lupa and wants to be sure that Lupa knows the message has not
|| || || || || || || || || || || || || || || || || || ||
bee modified in transit.
|| || || ||
What technique/tool could Dieter use to assist in this effort?
|| || || || || || || || ||
Hashing
,2
Fill in the missing word: Logs should be reviewed_________________.
|| || || || || || || ||
Continually
Fill in the missing word: Security controls on log data should reflect
|| || || || || || || || || || ||
The Sensitivity of the source device
|| || || || ||
Fill in the missing word: Log data should be kept ________.
|| || || || || || || || || ||
On a device other than where it was captured
|| || || || || || || ||
Fill in the missing word: Data _______ is data left behind on systems/media after normal deletion
|| || || || || || || || || || || || || || || ||
procedures have been attempted. || || ||
Remanence
Fill in the missing word: When data has reached the end of the retention period, it should be
|| || || || || || || || || || || || || || || || || ||
_____________.
Destroyed
Fill in the messing word: Data retention periods apply to ___________ data.
|| || || || || || || || || || ||
all of the answers
|| || ||
|| || ||
, 2
Fill in the missing word: Security needs to be provided to ________data.
|| || || || || || || || || || ||
All of the answers
|| || ||
|| || ||
Every document owned by Triffid, Inc., whether hardcopy or electronic, has a clear, 24-point
|| || || || || || || || || || || || || ||
word at the top and bottom. Only three words can be used: "Sensitive", "Proprietary", and
|| || || || || || || || || || || || || || ||
"Public".
This is an example of _____.
|| || || || ||
Labeling
Fill in the missing word:
|| || || ||
Archiving is typically done when _________. || || || || ||
Data is not needed for regular work purposes
|| || || || || || ||
What type of device is commonly advisable to have on the perimeter between two networks?
|| || || || || || || || || || || || || ||
Firewall
Fill in the missing word:
|| || || ||
An IoT (Internet of Things) device is typified by its effect on or use of the _____ environment.
|| || || || || || || || || || || || || || || || ||
Physical
isc2 certified in cyber security Exam with accurate detailed
|| || || || || || || || ||
solutions
Hashing is often used to provide || || || || ||
Integrity
If two people want to use asymmetric communication to conduct a confidential conversation, how
|| || || || || || || || || || || || ||
many keys fo they need?
|| || || || ||
4
Fill in the missing word: The output of a hashing algorithm is __________.
|| || || || || || || || || || || ||
The same length|| ||
Which one of the following is a benefit of computer-based training (CBT)?
|| || || || || || || || || || ||
Scalable
What is the most crucial element of any security instruction program?
|| || || || || || || || || ||
Preserve health and human safety || || || ||
Fill in the missing word: The organization should keep a copy of every signed Acceptable Use
|| || || || || || || || || || || || || || || ||
Policy (AUP) on file, and issue a copy to _________.
|| || || || || || || || ||
The user who signed it
|| || || ||
,2
Why is the proper alignment of security policy and business goals within the organization
|| || || || || || || || || || || || || ||
important?
Security policy that conflicts with business goals can inhibit productivity
|| || || || || || || || ||
Fill in the missing word: An organization must always be prepared to ________ when applying a
|| || || || || || || || || || || || || || || ||
patch.
Rollback
Fill in the missing word: _____________ is used to ensure that configuration management
|| || || || || || || || || || || || ||
activities are effective and enforced. || || || ||
Verification and audit || ||
Triffid, Inc., wants to host streaming video files for the company's remote users but wants to
|| || || || || || || || || || || || || || || ||
ensure the data is protected while its streaming.
|| || || || || || ||
Which of the following methods are probably best for this purpose?
|| || || || || || || || || ||
Symmetric encryption ||
Dieter wants to send a message to Lupa and wants to be sure that Lupa knows the message has not
|| || || || || || || || || || || || || || || || || || ||
bee modified in transit.
|| || || ||
What technique/tool could Dieter use to assist in this effort?
|| || || || || || || || ||
Hashing
,2
Fill in the missing word: Logs should be reviewed_________________.
|| || || || || || || ||
Continually
Fill in the missing word: Security controls on log data should reflect
|| || || || || || || || || || ||
The Sensitivity of the source device
|| || || || ||
Fill in the missing word: Log data should be kept ________.
|| || || || || || || || || ||
On a device other than where it was captured
|| || || || || || || ||
Fill in the missing word: Data _______ is data left behind on systems/media after normal deletion
|| || || || || || || || || || || || || || || ||
procedures have been attempted. || || ||
Remanence
Fill in the missing word: When data has reached the end of the retention period, it should be
|| || || || || || || || || || || || || || || || || ||
_____________.
Destroyed
Fill in the messing word: Data retention periods apply to ___________ data.
|| || || || || || || || || || ||
all of the answers
|| || ||
|| || ||
, 2
Fill in the missing word: Security needs to be provided to ________data.
|| || || || || || || || || || ||
All of the answers
|| || ||
|| || ||
Every document owned by Triffid, Inc., whether hardcopy or electronic, has a clear, 24-point
|| || || || || || || || || || || || || ||
word at the top and bottom. Only three words can be used: "Sensitive", "Proprietary", and
|| || || || || || || || || || || || || || ||
"Public".
This is an example of _____.
|| || || || ||
Labeling
Fill in the missing word:
|| || || ||
Archiving is typically done when _________. || || || || ||
Data is not needed for regular work purposes
|| || || || || || ||
What type of device is commonly advisable to have on the perimeter between two networks?
|| || || || || || || || || || || || || ||
Firewall
Fill in the missing word:
|| || || ||
An IoT (Internet of Things) device is typified by its effect on or use of the _____ environment.
|| || || || || || || || || || || || || || || || ||
Physical