100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

(ISC)2 Certified in Cybersecurity - Exam Prep questions with accurate solutions

Puntuación
-
Vendido
-
Páginas
101
Grado
A+
Subido en
09-01-2026
Escrito en
2025/2026

(ISC)2 Certified in Cybersecurity - Exam Prep questions with accurate solutions

Institución
ISC2 Certified In Cybersecurity
Grado
ISC2 Certified in Cybersecurity











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
ISC2 Certified in Cybersecurity
Grado
ISC2 Certified in Cybersecurity

Información del documento

Subido en
9 de enero de 2026
Número de páginas
101
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

2



(ISC)2 Certified in Cybersecurity Exam Prep questions
|| || || || || || || ||




with accurate solutions
|| ||




Document specific requirements that a customer has about any aspect of a vendor's service
|| || || || || || || || || || || || || ||




performance.


A) DLR
||




B) Contract
||




C) SLR
||




D) NDA - ✔✔C) SLR (Service-Level Requirements)
|| || || || || ||




_________ identifies and triages risks. - ✔✔Risk Assessment
|| || || || || || ||




_________ are external forces that jeopardize security. - ✔✔Threats
|| || || || || || || ||




_________ are methods used by attackers. - ✔✔Threat Vectors
|| || || || || || || ||




_________ are the combination of a threat and a vulnerability. - ✔✔Risks
|| || || || || || || || || || ||




We rank risks by _________ and _________. - ✔✔Likelihood and impact
|| || || || || || || || || ||




_________ use subjective ratings to evaluate risk likelihood and impact. - ✔✔Qualitative Risk
|| || || || || || || || || || || || ||




Assessment


_________ use objective numeric ratings to evaluate risk likelihood and impact. -
|| || || || || || || || || || || ||




✔✔Quantitative Risk Assessment || ||

,2


_________ analyzes and implements possible responses to control risk. - ✔✔Risk Treatment
|| || || || || || || || || || ||




_________ changes business practices to make a risk irrelevant. - ✔✔Risk Avoidance
|| || || || || || || || || || ||




_________ reduces the likelihood or impact of a risk. - ✔✔Risk Mitigation
|| || || || || || || || || || ||




An organization's _________ is the set of risks that it faces. - ✔✔Risk Profile
|| || || || || || || || || || || || ||




_________ Initial Risk of an organization. - ✔✔Inherent Risk
|| || || || || || || ||




_________ Risk that remains in an organization after controls. - ✔✔Residual Risk
|| || || || || || || || || || ||




_________ is the level of risk an organization is willing to accept. - ✔✔Risk Tolerance
|| || || || || || || || || || || || || ||




_________ reduce the likelihood or impact of a risk and help identify issues. - ✔✔Security
|| || || || || || || || || || || || || || ||




Controls


_________ stop a security issue from occurring. - ✔✔Preventive Control
|| || || || || || || || ||




_________ identify security issues requiring investigation. - ✔✔Detective Control
|| || || || || || || ||




_________ remediate security issues that have occurred. - ✔✔Recovery Control
|| || || || || || || || ||




Hardening == Preventative - ✔✔Virus == Detective
|| || || || || ||




Backups == Recovery - ✔✔For exam (Local and Technical Controls are the same)
|| || || || || || || || || || || ||

,2


_________ use technology to achieve control objectives. - ✔✔Technical Controls
|| || || || || || || || ||




_________ use processes to achieve control objectives. - ✔✔Administrative Controls
|| || || || || || || || ||




_________ impact the physical world. - ✔✔Physical Controls
|| || || || || || ||




_________ tracks specific device settings. - ✔✔Configuration Management
|| || || || || || ||




_________ provide a configuration snapshot. - ✔✔Baselines (track changes)
|| || || || || || || ||




_________ assigns numbers to each version. - ✔✔Versioning
|| || || || || || ||




_________ serve as important configuration artifacts. - ✔✔Diagrams
|| || || || || || ||




_________ and _________ help ensure a stable operating environment. - ✔✔Change and
|| || || || || || || || || || || ||




Configuration Management ||




Purchasing an insurance policy is an example of which risk management strategy? - ✔✔Risk
|| || || || || || || || || || || || || ||




Transference


What two factors are used to evaluate a risk? - ✔✔Likelihood and Impact
|| || || || || || || || || || || ||




What term best describes making a snapshot of a system or application at a point in time for later
|| || || || || || || || || || || || || || || || || || ||




comparison? - ✔✔Baselining || ||




What type of security control is designed to stop a security issue from occurring in the first place?
|| || || || || || || || || || || || || || || || || ||




- ✔✔Preventive
||

, 2


What term describes risks that originate inside the organization? - ✔✔Internal
|| || || || || || || || || ||




What four items belong to the security policy framework? - ✔✔Policies, Standards, Guidelines,
|| || || || || || || || || || || || ||




Procedures


_________ describe an organization's security expectations. - ✔✔Policies (mandatory and
|| || || || || || || || || ||




approved at the highest level of an organization)
|| || || || || || ||




_________ describe specific security controls and are often derived from policies. -
|| || || || || || || || || || || ||




✔✔Standards (mandatory) ||




_________ describe best practices. - ✔✔Guidelines (recommendations/advice and compliance is
|| || || || || || || || || ||




not mandatory)
||




_________ step-by-step instructions. - ✔✔Procedures (not mandatory)
|| || || || || ||




_________ describe authorized uses of technology. - ✔✔Acceptable Use Policies (AUP)
|| || || || || || || || || ||




_________ describe how to protect sensitive information. - ✔✔Data Handling Policies
|| || || || || || || || || ||




_________ cover password security practices. - ✔✔Password Policies
|| || || || || || ||




_________ cover use of personal devices with company information. - ✔✔Bring Your Own
|| || || || || || || || || || || || ||




Device (BYOD) Policies
|| ||




_________ cover the use of personally identifiable information. - ✔✔Privacy Policies
|| || || || || || || || || ||




_________ cover the documentation, approval, and rollback of technology changes. - ✔✔Change
|| || || || || || || || || || ||




Management Policies
|| ||
$27.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Ruiz Liberty University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
84
Miembro desde
1 año
Número de seguidores
1
Documentos
12239
Última venta
3 días hace
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.2

9 reseñas

5
3
4
1
3
2
2
1
1
2

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes