Exhibit.
What is the purpose of a Security Information and Event Management (SIEM) system?
Removing the belief that a network has any trusted space and enforcing security at the most granular level is known as:
Which of the following is NOT one of the three main components of an SQL database?
A scam where a malicious website is made to look exactly like a trusted site is called:
The harmonization of automated computing tasks into reusable workflows is called:
Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which control would BEST achieve his objective?
A measure of the degree to which an organization depends on information or systems to achieve its mission is called:
Mark has purchased a Mac laptop. He is scared of losing his screen and is planning to buy an insurance policy. Which risk management strategy is this?
A device that forwards traffic to the port of a known destination device is a:
Selvaa presents a user ID and password to log on. Which characteristic must the user ID have?
Configuration settings or parameters stored as data and managed through a software graphical user interface (GUI) are examples of:
The documented set of procedures to detect, respond to, and limit the consequences of cyberattacks is called:
Which zero-trust component breaks LANs into very small, localized security zones?
Which uses encrypted, machine-generated codes to verify a user's identity?
Events with negative consequences such as crashes, floods, defacement, or malicious code execution are called:
In which cloud model does the customer have theleast responsibilityover infrastructure?
A company wants to prevent employees from bringing unauthorized electronic devices into the workspace. Which physical control is best?
In which access control model can the creator of an object delegate permissions?
Which type of network is set up similar to the internet but is private to an organization? Select the MOST appropriate answer.
Protection against an individual falsely denying having performed a particular action.
An IP network protocol standardized by the IETF through RFC 792 to determine if a host is available is:
Access control used in high-security military and government environments:
Which document serves as specifications for implementing policy and dictates mandatory requirements?
Which technology should be implemented to increase the work effort required for buffer overflow attacks?
A company analyzes system requirements, functions, and interdependencies to prioritize contingency needs. What is this process called?
What does the term “Two-factor authentication†refer to in cybersecurity?
Natalia wants to ensure the authenticity of her organization’s domain name records using digital signatures. What technology should she use?
A security event does not affect confidentiality, integrity, or availability. What is it?
An employee launched a privilege escalation attack to gain root access on one of the organization’s database servers. The employee has an authorized user account on the server. What log file would MOST likely contain relevant information?
Malicious code that acts like a remotely controlled “robot†for an attacker.
Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?
A one-way spinning door or barrier that allows only one person at a time to enter a building or area.
Which approach involves a continuous cycle of identifying, assessing, prioritizing, and mitigating cybersecurity risks?
The common term for systems that control temperature and humidity in a data center is:
A hacker gains unauthorized access and steals confidential data. What term best describes this?
A type of malware capable of self-propagation and infecting multiple systems without human intervention is called:
Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which control would BEST achieve this objective?
Which type of database combines related records and fields into a logical tree structure?
An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant is known as:
Often offered by third-party organizations and covering advisory or compliance objectives:
Which access control model can grant access to a given object based on complex rules?
An agreement between a cloud service provider and a customer based on cloud-specific terms is called:
Who is responsible for publishing and signing the organization’s policies?
Configuration settings or parameters stored as data and managed through a GUI are examples of:
An employee unintentionally shares confidential information with an unauthorized party. What term best describes this?
An external entity has tried to gain access to your organization’s IT environment without authorization. This is an example of a(n):
What is the focus of disaster recovery planning after a data center outage?
Which document identifies the principles and rules governing an organization’s protection of information systems and data?
To avoid bodily injury claims, a company decides not to offer high-risk services. This is an example of:
Which type of control minimizes the impact of an attack and restores normal operations as quickly as possible?
If a device is found to be non-compliant with the security baseline, what action should the security team take?
A structured way to align IT with business goals while managing risk and regulations:
An ISC2 member is offered an illicit copy of a movie. What should they do?
Which access control method uses attributes and rules evaluated by a central Policy Decision Point (PDP)?
Which access control model is best suited for a large organization with many departments and varied access needs?
The evaluation of security controls to determine whether they are implemented correctly and operating as intended is known as:
An external entity attempts unauthorized access to your IT environment. This is a(n):
An analysis of system requirements and interdependencies used to prioritize recovery is known as:
Are events that may indicate that an organization's systems or data have been compromised or that protective measures have failed.
What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?