Certified in Cybersecurity
Braindump CC ISC2
Braindump CC ISC2
Fichier Détails
Cartes-fiches | 200 |
---|---|
Utilisateurs | 19 |
Langue | English |
Catégorie | Informatique |
Niveau | Université |
Crée / Actualisé | 18.08.2023 / 11.06.2025 |
Lien de web |
https://card2brain.ch/box/20230818_certified_in_cybersecurity
|
Intégrer |
<iframe src="https://card2brain.ch/box/20230818_certified_in_cybersecurity/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Which of the following Cybersecurity concepts guarantees that information is accessible only to those authorized to access it?
Which type of attack has the PRIMARY objective of encrypting devices and their data, and then demanding a ransom payment for the decryption key?
In the event of a disaster, which of these should be the PRIMARY objective? ( )
According to ISC2, which are the six phases of data handling?
Which devices have the PRIMARY objective of collecting and analyzing security events?
Which of these is the PRIMARY objective of a Disaster Recovery Plan?
Which of the following areas is the most distinctive property of PHI?
Which of the following properties is NOT guaranteed by Digital Signatures?
A biometric reader that grants access to a computer system in a data center is a:
Which of the following documents contains elements that are NOT mandatory?
Which of the following are NOT types of security controls?
After an earthquake disrupting business operations, which document contains the procedures required to return business to normal operation?
Which of the following is NOT an ethical canon of the ISC2?
How many data labels are considered good practice?
Risk Management is:
According to the canon "Provide diligent and competent service to principals", ISC2 professionals are to:
Which of these is NOT a change management component?
Which of the following is not a protocol of the OSI Level 3?
Which of the following principles aims primarily at fraud detection?
Which tool is commonly used to sniff network traffic? ( )
The magnitude of the harm expected as a result of the consequences of an unauthorized disclosure, modification, destruction, or loss of information, is known as the:
A web server that accepts requests from external clients should be placed in which network?
The process of verifying or proving the user's identification is known as:
Which of these is the most efficient and effective way to test a business continuity plan?
Which regulations address data protection and privacy in Europe?
The SMTP protocol operates at OSI Level:
Which of the following canons is found in the ISC2 code of ethics?
Which port is used to secure communication over the web (HTTPS)?
A best practice of patch management is to:
In order to find out whether personal tablet devices are allowed in the office, which of the following policies would be helpful to read?
In which cloud model does the cloud customer have LESS responsibility over the infrastructure? ( )
In Software as a Service (SaaS), consumers may control user-specific application configuration settings, but neither the underlying application logic nor the infrastructure.
Which of the following is NOT a social engineering technique?
Which device is used to connect a LAN to the Internet?
A router is a device that acts as a gateway between two or more networks by relaying and directing data packets between them
Which of the following is NOT a type of learning activity used in Security Awareness?
The three learning activities that organizations use in training for security awareness are Education, Training and Awareness. A tutorial is a form of training, but is not on the list of types of learning activities.
Which are the three packets used on the TCP connection handshake? ( )
TCP uses a three-way handshake to establish a reliable connection by exchanging three packets with the SYN, SYN/ACK and ACK flags. Although SYN, ACK and FIN are valid TCP packet flags, the sequence SYN → ACK → FIN is not the TCP handshake. Both the sequences Discover → Offer → Request and Offer → Request → ACK are used in DHCP
An exploitable weakness or flaw in a system or component is a:
If there is no time constraint, which protocol should be employed to establish a reliable connection between two devices?
TCP is used for connection-oriented communication, verifies data delivery, and is known to favor reliability. In a congested network, TCP delays data transmission, and thus cannot guarantee delivery under time constraints. UDP favors speed and efficiency over reliability, and thus cannot ensure a reliable connection. DHCP and SNMP are (respectively) a device configuration and a device management protocol, which means that neither aims to establish connections between devices.
An entity that acts to exploit a target organization’s system vulnerabilities is a:
A Threat Actor is defined as an individual or a group posing a threat (according to NIST SP 800-150 under Threat Actor). A Threat Vector is a means by which a Threat Actor gains access to systems (for example: phishing, trojans, baiting, etc.). An Attacker is always an individual, but a Threat Actor can be either a group or an entity. A Threat is a circumstance or event that can adversely impact organizational operations that a Threat Actor can potentially explore through a Threat Vector.
Which of the following is NOT an example of a physical security control?
Firewalls are a type of electronic equipment which connects to a network that filters inbound traffic arriving from the Internet, and, thus are a type of technical security controls. Security cameras, biometric access control and electronic locks, though connected to a network, control access to physical facilities, and thus are types of physical security controls.
What is the consequence of a Denial Of Service attack?
A denial of service attack (DoS) consists in a malicious overload of requests which will eventually lead to the exhaustion of resources, rendering the service unavailable, as well as causing the activation of safety mechanisms that delay or limit the availability of that system or service. This type of attack seeks to compromise service availability, but not to control a device nor to install malware.