CC Quiz
CC Quiz
B) Integrity
C) Availability
D) Confirmation
B) Inform ISC2
D) Software that checks the spelling of product descriptions for a retail website
Question options:
A) User ID
B) Password
C) Fingerprint
D) Iris scan
B) Policy
C) Standard
D) Procedure
B) Administrative
C) Drastic
D) Technical
Question options:
A) recommend a different vendor/product
B) Obverse
C) Physical
D) Administrative
C) Senior management
D) Anyone
B) Avoidance
C) Mitigation
D) Transference
D) Nothing
B) Threat
C) Control
D) Asset
C) Mitigation
D) Transference
B) Administrative
C) Critical
D) Technical
D) The Constitution
B) Multifactor authentication
C) Biometrics
D) Privacy
B) Security analysts
C) Automated tools
D) Regulators
B) Event
C) Attack
D) Threat
C) Punish wrongdoers
D) Save money
B) Impress customers
B) Applicable laws
C) Industry standards
B) Segregation of duties
C) Software
D) Defense in depth
C) Defense in depth
D) Penetration testing
B) The object
C) The rule
D) The firmware
D) Security policy
B) If Trina logs in for Doug, then Doug will never be encouraged to remember credentials without assistance
B) Segregation of duties
C) Least privilege
D) Dual control
B) Law
C) Log
D) Firewall
B) Preventive
C) Deterrent
D) Logical
B) Fence
D) Receptionist
B) Layered defense
C) Two-person integrity
D) Least privilege
D) Barbed wire
Question options:
A) Privileged
B) Internal
C) External
D) User
B) A lock on a door
D) A process that requires two people to act at the same time to perform a function
C) Users remember their credentials if they are given time to think about it
D) Defense-in-depth
B) Switch
C) Server
D) Laptop
Question options:
A) VLAN
B) DMZ
C) MAC
D) RBAC
B) Physical
C) Regulated
D) Logical
B) HVAC
C) MAC
D) Firewalls
B) Remote
C) Internal
D) Physical
D) Firewall
B) Dirt
C) Oxygen-depletion
D) Gaseous
B) Mail server
C) Database engine
B) Anti-malware
C) Router
D) SIEM
Hide question 57 feedback
SIEM/SEM/SIM solutions are typically designed specifically for this purpose. D is the correct answer. A and C a
specific single sources of log data. B is incorrect; anti-malware does not typically gather log data from multiple s
n 58 1
To adequately ensure availability for a data center, it is best to plan for both
resilience and _______ of the elements in the facility. (D4.3 L4.3.1)
Question options:
A) Uniqueness
B) Destruction
C) Redundancy
D) Hue
B) Dirt
C) Oxygen-depletion
D) Gaseous
Question options:
A) VPN
B) Least privilege
C) Internet
D) Defense in depth
B) 80
C) 247
D) 999
C) Camera
D) Firewall
B) Continually
B) Clockwise rotation
C) Symmetric encryption
D) Asymmetric encryption
Question options:
A) Keeping out intruders
B) Packets
C) Remanence
D) Residue
C) Private
D) All
C) Senior management
D) Auditors
B) Baseline
C) Identification
B) In an underground bunker
C) In airtight containers
B) Sensitive
C) All
D) Secret
C) Lawmakers