Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

John joined the ISC2 organization. His manager asked him to check the authentication controls in a security module. What would John use to ensure a certain control is working as he expects it to?

A.

Security testing

B.

Security assessment

C.

Security audit

D.

Security walkthrough

Which protocol would be most suitable to fulfill the secure communication requirements between clients and the server for a company deploying a new application?

A.

FTP

B.

HTTP

C.

HTTPS

D.

SMTP

What is meant by non-repudiation?

A.

If a user does something, they can't later claim that they didn't do it.

B.

Controls to protect the organization's reputation from harm due to inappropriate social media postings by employees, even if on their private accounts and personal time.

C.

It is part of the rules set by administrative controls.

D.

It is a security feature that prevents session replay attacks.

Which of the following is NOT one of the three main components of an SQL database?

A.

Views

B.

Schemas

C.

Tables

D.

Object-oriented interfaces

An IP network protocol standardized by the IETF through RFC 792 to determine if a host is available is:

A.

IP

B.

ICMP

C.

IGMP

D.

HTTP

Which is NOT a component of a Business Continuity (BC) plan?

A.

Immediate response procedures

B.

Notification systems

C.

Management authority guidance

D.

Management

David's team recently implemented a new system that gathers information from a variety of different log sources, analyzes that information, and then triggers automated playbooks in response to security events. What term BEST describes this technology?

A.

SIEM

B.

Log Repository

C.

IPS

D.

SOAR

Exhibit.

What kind of vulnerability is typically not identifiable through a standard vulnerability assessment?

A.

File permissions

B.

Buffer overflow

C.

Zero-day vulnerability

D.

Cross-site scripting

A DDoS attack affects which OSI layers?

A.

Network layer

B.

Transport layer

C.

Physical layer

D.

Both A and B

An unusual occurrence in a system or network is best described as:

A.

Breach

B.

Exploit

C.

Event

D.

Intrusion