New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In the context of cybersecurity, typical threat actors include the following:

A.

Insiders (either deliberately, by simple human error, or by gross incompetence).

B.

Outside individuals or informal groups (either planned or opportunistic, discovering vulnerability).

C.

Technology (such as free-running bots and artificial intelligence

D.

All

Which penetration testing technique requires the team to do the MOST work and effort?

A.

White box

B.

Blue box

C.

Gray box

D.

Black box

The DLP solution should be deployed so that it can inspect all forms of data leaving the organization, including:

A.

Posting to web pages/websites

B.

Applications/application programming interfaces (APIs)

C.

Copy to portable media

D.

AII

What does Criticality represents?

A.

The need for consultation with the involved business ensure critical systems are identified and available

B.

The importance an organization gives to data or an information system in performing its operations or achieving its mission

C.

The need for security professional to ensure the appropriate levels of availavility are provided

D.

All of the above

Walmart has large ecommerce presence in world. Which of these solutions would ensure the LOWEST possible latency for their customers using their services?

A.

CDN

B.

SaaS

C.

Load Balancing

D.

Decentralized Data Centers

What is the recommended fire suppression system for server rooms

A.

Foam based

B.

Water based

C.

Powder based

D.

ftac hacorl

Which is an authorized simulated attack performed on a computer system to evaluate its security.

A.

Penetration test

B.

Security Testing

C.

Automated Testing

D.

Regression Testing

John joined the ISC2 Organizations, his manager asked to check the authentications in security module. What would John use to ensure a certain control is working as he want and expect it to?

A.

Security Testing

B.

Security assessment

C.

Security audit

D.

Security walkthrough

A company network experience a sudden flood of network packets that causes major slowdown in internet traffic. What type of event it this?

A.

Security incident

B.

Natural disaster

C.

Exploit

D.

Adverse event

Which of the following is unlikely to be a member of the disaster recovery team

A.

Executive Management

B.

Public Relations

C.

Billing Clerk

D.

IT personnel