Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which is the first step in the risk management process?

A.

Risk response

B.

Risk mitigation

C.

Risk identification

D.

Risk assessment

Which of the following attacks can TLS help mitigate?

A.

Cross-site Scripting (XSS) attacks

B.

Social engineering attacks

C.

Man-in-the-middle (MITM) attacks

D.

SQL injection attacks

What does the termbusinessin business continuity planning refer to?

A.

The financial performance of the organization

B.

The technical systems of the organization

C.

The operational aspects of the organization

D.

The physical infrastructure of the organization

Which plan is activated when Incident Response and BCP fail?

A.

Risk management

B.

BIA

C.

DRP

D.

None

Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

A.

Brute-force attack

B.

Dictionary attack

C.

Social engineering attack

D.

Replay attack

According to ISC2 Code of Ethics, to whom does Kristal ultimately report?

A.

The company

B.

Governments

C.

ISC2

D.

The users

A device that forwards traffic to the port of a known destination device is a:

A.

Switch

B.

Hub

C.

Router

D.

Ethernet

The DevOps team has updated the application source code. Tom discovered that many unauthorized changes have been made. What is the BEST control Tom can implement to prevent a recurrence of this problem?

A.

Backup

B.

File labels

C.

Security audit

D.

Hashing

A set of instructions to detect, respond to, and recover from security incidents is a:

A.

BCP

B.

IRP

C.

DRP

D.

None

A team activates procedures to mitigate a cyberattack. What plan is this?

A.

Business Continuity Plan

B.

Incident Response Plan

C.

Disaster Recovery Plan

D.

Security Operations Plan