CC Question [PDF]

  • 0 0 0
  • Gefällt Ihnen dieses papier und der download? Sie können Ihre eigene PDF-Datei in wenigen Minuten kostenlos online veröffentlichen! Anmelden
Datei wird geladen, bitte warten...
Zitiervorschau

Chapter 1:

Muhammad Rashid Sattar (username: [email protected]) Attempt 1 Written: Dec 1, 2022 4:36 AM - Dec 1, 2022 4:45 AM

Submission View

Your quiz has been submitted successfully. 1 / 1 point

A chief information security officer (CISO) at a large organization documented a policy that establishes the acceptable use of cloud environments for all staff. This is an example of a: (D1, L1.3.1) Question options: A) Management/Administrative control

B) Technical control C) Physical control D) Cloud control View question 1 feedback 1 / 1 point

Is it possible to avoid risk? (D1, L1.2.1) Question options: A) Yes B) No C) Sometimes D) Never View question 2 feedback 0 / 1 point

What is meant by non-repudiation?  (D1, L1.1.1) Question options: A) If a user does something, they can't later claim that they didn't do it.

B) Controls to protect the organization's reputation from harm due to inappropriate social media postings time.    C) It is part of the rules set by administrative controls.  D) It is a security feature that prevents session replay attacks. 

View question 3 feedback 1 / 1 point

Which of the following is NOT one of the four typical ways of managing risk?  (D1, L1.2.1) Question options: A) Avoid

B) Accept

C) Mitigate D) Conflate View question 4 feedback 1 / 1 point

Siobhan is deciding whether to make a purchase online; the vendor wants Siobhan to create a new user account, and is requesting Siobhan's full name, home address, credit card number, phone number, email address, the ability to send marketing messages to Siobhan, and permission to share this data with other vendors. Siobhan decides that the item for sale is not worth the value of Siobhan's personal information, and decides to not make the purchase.   What kind of risk management approach did Siobhan make? (D1, L1.2.2) Question options: A) Avoidance B) Acceptance C) Mitigation

D) Transfer View question 5 feedback 1 / 1 point

Guillermo is the system administrator for a midsized retail organization. Guillermo has been tasked with writing a document that describes, step-by-step, how to securely install the operating system on a new laptop. This document is an example of a ________. (D1, L1.4.1) Question options: A) Policy

B) Standard C) Procedure D) Guideline View question 6 feedback 1 / 1 point

Lankesh is the security administrator for a small food-distribution company. A new law is published by the country in which Lankesh's company operates; the law conflicts with the company's policies. Which governance element should Lankesh's company follow? (D1, L1.4.2) Question options: A) The law B) The policy C) Any procedures the company has created for the particular activities affected by the law

D) Lankesh should be allowed to use personal and professional judgment to make the determination of ho View question 7 feedback 0 / 1 point

Kristal is the security administrator for a large online service provider. Kristal learns that the company is harvesting personal data of its customers and sharing the data with local governments where the company operates, without the knowledge of the users, to allow the governments to persecute users on the basis of their political and philosophical beliefs. The published user agreement states that the company will not share personal user data with any entities without the users' explicit permission.  According to the (ISC) 2 Code of Ethics, to whom does Kristal ultimately owe a duty in this situation? (D1, L1.5.1) Question options: A) The governments of the countries where the company operates  B) The company Kristal works for 

C) The users D) (ISC)2  View question 8 feedback 1 / 1 point

While taking the certification exam for this certification, you notice another candidate for the certification cheating. What should you do? (D1, L1.5.1) Question options:

A) Nothing—each person is responsible for their own actions. B) Yell at the other candidate for violating test security. C) Report the candidate to (ISC)2. 

D) Call local law enforcement. View question 9 feedback 1 / 1 point

The concept of "secrecy" is most related to which foundational aspect of security? (D1, L1.1.1) Question options: A) Confidentiality B) Integrity

C) Availability D) Plausibility View question 10 feedback

Congratulations, you passed the quiz! You've achieved an overall grade of 70% or higher and completed this activity.

80 % Chapter 2:

Muhammad Rashid Sattar (username: [email protected] Attempt 1 Written: Dec 1, 2022 5:21 AM - Dec 1, 2022 5:30 AM

Submission View

Your quiz has been submitted successfully. Question 1

1 / 1 point

You are working in your organization's security office. You receive a call from

network several times with the correct credentials, with no success. This is an Question options: A) Emergency B) Event C) Policy D) Disaster

View question 1 feedback Question 2

1 / 1 point

You are working in your organization's security office. You receive a call from

network several times with the correct credentials, with no success. After a br

user's account has been compromised. This is an example of a(n)_______. (D2, Question options: A) Risk management

B) Incident detection C) Malware D) Disaster View question 2 feedback Question 3

1 / 1 point

An external entity has tried to gain access to your organization's IT environme example of a(n) _________. (D2, L2.1.1) Question options: A) Exploit B) Intrusion

C) Event D) Malware View question 3 feedback Question 4

0 / 1 point

When responding to a security incident, your team determines that the vulner

known to the security community, and that there are no currently known defin databases or collections. This vulnerability and exploit might be called ______ Question options: A) Malware B) Critical C) Fractal

D) Zero-day View question 4 feedback Question 5

1 / 1 point

True or False? The IT department is responsible for creating the organization's Question options: True False View question 5 feedback Question 6

0 / 1 point

The Business Continuity effort for an organization is a way to ensure critical _

disaster, emergency, or interruption to the production environment. (D2, L 2.2 Question options: A) Business B) Technical C) IT D) Financial View question

6 feedback Question 7

1 / 1 point

Which of the following is very likely to be used in a disaster recovery (DR) effo Question options: A) Guard dogs

B) Data backups C) Contract personnel

D) Anti-malware solutions View question 7 feedback Question 8

1 / 1 point

Which of the following is often associated with DR planning? (D2, L 2.3.1) Question options: A) Checklists B) Firewalls C) Motion detectors D) Non-repudiation View question 8 feedback Question 9

0 / 1 point

Which of these activities is often associated with DR efforts? (D2, L2.3.1) Question options: A) Employees returning to the primary production location

B) Running anti-malware solutions

C) Scanning the IT environment for vulnerabilities

D) Zero-day exploits Hide question 9 feedback Incorrect. Zero-day exploits are a security threat, but not typically associated with DR efforts. Question 10

1 / 1 point

Which of these components is very likely to be instrumental to any disaster re Question options: A) Routers B) Laptops C) Firewalls D) Backups View question 10 feedback

Congratulations, you passed the quiz!

You've achieved an overall grade of 70% or higher and completed this activity.

70 %

Chapter 3:

Muhammad Rashid Sattar (username: [email protected] Attempt 4 Written: Dec 2, 2022 12:25 AM - Dec 2, 2022 12:26 AM

Submission View

Your quiz has been submitted successfully. Question 1

1 / 1 point

Which of the following is a subject? (D 3, L3.1.1) Question options: A) A file B) A fence C) A filename

D) A user View question 1 feedback Question 2

1 / 1 point

Lia works in the security office. During research, Lia learns that a configuratio

organization's IT environment. Lia makes a proposal for this change, but the c

approved, tested, and then cleared for deployment by the Change Control Boa __________. (D3, L3.1.1) Question options: A) Defense in depth

B) Holistic security C) Threat intelligence

D) Segregation of duties View question 2 feedback Question 3

1 / 1 point

Duncan and Mira both work in the data center at Triffid, Inc. There is a policy

present in the data center at the same time; if one of them has to leave for an until they can both re-enter. This is called ________. (D 3, L3.1.1) Question options: A) Blockade

B) Multifactor authentication C) Two-person integrity D) Defense in depth View question 3 feedback Question 4

1 / 1 point

Clyde is the security analyst tasked with finding an appropriate physical contr

people will follow badged employees through the entrance of the organization address this risk? (D3, L3.2.1) 

Question options: A) Fences

B) Dogs C) Bollards D) Turnstiles View question 4 feedback Question 5

1 / 1 point

Sinka is considering a physical deterrent control to dissuade unauthorized peo property. Which of the following would serve this purpose? (D3, L3.2.1) Question options: A) A wall

B) Razor tape C) A sign

D) A hidden camera View question 5 feedback Question 6

1 / 1 point

Which of these combinations of physical security controls share a single point Question options: A) Guards and fences B) Badge readers and walls

C) Dogs and bollards

D) High-illumination lighting and cameras View question 6 feedback Question 7

1 / 1 point

Lakshmi presents a userid and a password to a system in order to log on. Whi the userid  have? (D3, L3.3.1)  Question options: A) Confidential

B) Complex C) Unique D) Long View question 7 feedback Question 8

1 / 1 point

Lakshmi presents a userid and a password to a system in order to log on. Whi the password have? (D3, L3.3.1)  Question options: A) Confidential B) Unique C) Mathematical D) Shared View question

8 feedback Question 9

1 / 1 point

Derrick logs on to a system in order to read a file. In this example, Derrick is t Question options: A) Subject

B) Object C) Process

D) Predicate View question 9 feedback Question 10

1 / 1 point

Which is a physical control that prevents "piggybacking" or "tailgating"; that is authorized person into a controlled area? (D3, L3.2.1) Question options: A) Bollard B) Turnstile C) Fence D) Wall View question 10 feedback

Congratulations, you passed the quiz! You've achieved an overall grade of 70% or higher and completed this

activity.

100 %

Chapter 4:

Muhammad Rashid Sattar (username: [email protected]) Attempt 2 Written: Dec 2, 2022 1:34 AM - Dec 2, 2022 1:35 AM

Submission View Your quiz has been submitted successfully. 1 / 1 point

Common network device used to connect networks. (D4.1 L4.1.1)  Question options: A) Server

B) Endpoint C) Router D) Switch View question 1 feedback 1 / 1 point

A common network device used to filter traffic. (D4.1 L4.1.1)  Question options: A) Server

B) Endpoint C) Ethernet D) Firewall View question

2 feedback 1 / 1 point

endpoint  Web server    Which port number is associated with the protocol typically used in this connection?  (D 4.1 L4.1.2)   Question options: A) 21

B) 53

C) 80 D) 161 View question 3 feedback 1 / 1 point

An attack against the availability of a network/system; typically uses many attacking machines to direct traffic against a given target. (D4.2 L4.2.1) Question options: A) Worm

B) Virus C) Stealth D) Distributed-denial-of-service (DDOS) View question

4 feedback 1 / 1 point

A security solution installed on an endpoint in order to detect potentially anomalous activity. (D4.2 L4.2.2) Question options: A) Router B) Host-based intrusion prevention system

C) Switch D) Security incident and event management system (SIEM) View question 5 feedback 1 / 1 point

A security solution that detects, identifies and often quarantines potentially hostile software. (D4.2, L4.2.2) Question options: A) Firewall B) Guard

C) Camera D) Anti-malware View question 6 feedback 1 / 1 point

The common term used to describe the mechanisms that control the temperature and humidity in a data center. (D4.3 L4.3.1) Question options: A) VLAN (virtual local area network)

B) HVAC (heating, ventilation and air conditioning) C) STAT (system temperature and timing) D) TAWC (temperature and water control) View question 7 feedback 1 / 1 point

A cloud arrangement whereby the provider owns and manages the hardware, operating system, and applications in the cloud, and the customer owns the data. (D4.3 L4.3.2) Question options: A) Infrastructure as a service (IaaS)

B) Morphing as a service (MaaS) C) Platform as a service (PaaS) D) Software as a service (SaaS) View question 8 feedback 1 / 1 point

A portion of the organization's network that interfaces directly with the outside world; typically, this exposed area has more security controls

and restrictions than the rest of the internal IT environment. (D4.3 L4.3.3) Question options: A) National Institute of Standards and Technology (NIST)

B) Demilitarized zone (DMZ) C) Virtual private network (VPN) D) Virtual local area network (VLAN)  View question 9 feedback 1 / 1 point

Which of the following tools can be used to grant remote users access to the internal IT environment? (D 4.3 L4.3.3) Question options: A) VLAN (virtual local area network) B) VPN (virtual private network) C) DDOS (distributed denial-of-service) D) MAC (media access control) View question 10 feedback

Congratulations, you passed the quiz!

You've achieved an overall grade of 70% or higher and completed this activity.

100 %

Chapter 5:

Muhammad Rashid Sattar (username: [email protected]) Attempt 4 Written: Dec 2, 2022 2:32 AM - Dec 2, 2022 2:33 AM

Submission View Your quiz has been submitted successfully.

1 / 1 point

Which of the following can be used to map data flows through an organization and the relevant security controls used at each point along the way? (D5.1, L5.1.1) Question options: A) Encryption B) Hashing C) Hard copy

D) Data life cycle View question 1 feedback 1 / 1 point

Why is an asset inventory so important? (D5.2, L5.2.1) Question options: A) It tells you what to encrypt

B) You can't protect what you don't know you have C) The law requires it D) It contains a price list View question 2 feedback 1 / 1 point

Who is responsible for publishing and signing the organization's policies? (D5.3, L5.3.1) Question options:

A) The security office B) Human Resources C) Senior management

D) The legal department View question 3 feedback 1 / 1 point

Which of the following is always true about logging? (D5.1, L5.1.3) Question options: A) Logs should be very detailed B) Logs should be in English

C) Logs should be concise D) Logs should be stored separately from the systems they're logging View question 4 feedback 1 / 1 point

A mode of encryption for ensuring confidentiality efficiently, with a minimum amount of processing overhead (D5.1, L5.1.3) Question options: A) Asymmetric B) Symmetric

C) Hashing D) Covert View question 5 feedback 1 / 1 point

A ready visual cue to let anyone in contact with the data know what the classification is. (D5.1, L5.1.1) Question options: A) Encryption

B) Label C) Graphics D) Photos View question 6 feedback 1 / 1 point

A set of security controls or system settings used to ensure uniformity of configuration throughout the IT environment. (D5.2, L5.2.1) Question options: A) Patches B) Inventory C) Baseline D) Policy

View question 7 feedback 1 / 1 point

What is the most important aspect of security awareness/training? (D5.4, L5.4.1) Question options: A) Protecting assets

B) Maximizing business capabilities C) Ensuring the confidentiality of data

D) Protecting health and human safety View question 8 feedback 1 / 1 point

Which entity is most likely to be tasked with monitoring and enforcing security policy? (D5.3, L5.3.1) Question options: A) The Human Resources office B) The legal department

C) Regulators D) The security office View question 9 feedback 1 / 1 point

Which organizational policy is most likely to indicate which types of smartphones can be used to connect to the internal IT environment? (D5.3, L5.3.1) Question options: A) The CM policy (change management) B) The password policy C) The AUP (acceptable use policy)

D) The BYOD policy (bring your own device) View question 10 feedback

Congratulations, you passed the quiz! You've achieved an overall grade of 70% or higher and completed this activity.

100 %