ISC2 Cybersecurity Certification Pre- Assessment Version 2 (New 2024/ 2025 Update) Questions and Verified Answers| 100% Correct | A Grade
QUESTION
... [Show More] The city of Grampon wants to ensure that all of its citizens are protected from malware, so the city council creates a rule that anyone caught creating and launching malware within the city limits will receive a fine and go to jail. What kind of rule is this?
Answer:
Law
QUESTION
Glen is an (ISC)² member. Glen receives an email from a company offering a set of answers for an (ISC)² certification exam. What should Glen do?
Answer:
Inform (ISC)²
QUESTION
Within the organization, who can identify risk?
Answer:
Anyone
QUESTION
Kerpak works in the security office of a medium-sized entertainment com- pany. Kerpak is asked to assess a particular threat, and he suggests that
the best way to counter this threat would be to purchase and implement a particular security solution. This is an example of .
Answer:
Mitigation
QUESTION
What is the risk associated with delaying resumption of full normal oper- ations after a disaster?
Answer:
The impact of running alternate operations for extended periods
QUESTION
Bruce is the branch manager of a bank. Bruce wants to determine which personnel at the branch can get access to systems, and under which con- ditions they can get access. Which access control methodology would allow Bruce to make this determination?
Answer:
DAC (discretionary access control)
QUESTION
Which of the following is a biometric access control mechanism?
Answer:
A door locked by a voiceprint identifier
QUESTION
Which of the following statements is true? (D3, L3.3.1) Question options:
A)Logical access controls can protect the IT environment perfectly; there is no reason to deploy any other controls
B)Physical access controls can protect the IT environment perfectly; there is no reason to deploy any other controls
C)Administrative access controls can protect the IT environment perfectly;
there is no reason to deploy any other controls
D)It is best to use a blend of controls in order to provide optimum security
Answer:
It is best to use a blend of controls in order to provide optimum security
QUESTION
Handel is a senior manager at Triffid, Inc., and is in charge of implementing a new access control scheme for the company. Handel wants to ensure that employees who are assigned to new positions in the company do not retain whatever access they had in their old positions. Which method should Handel select?
Answer:
Role-based access controls (RBAC)
QUESTION
Visitors to a secure facility need to be controlled. Controls useful for managing visitors include all of the following except
Answer:
Fence
QUESTION
Prachi works as a database administrator for Triffid, Inc. Prachi is allowed to add or delete users, but is not allowed to read or modify the data in the database itself. When Prachi logs onto the system, an access control list (ACL) checks to determine which permissions Prachi has.
In this situation, what is the ACL?
Answer:
The rule
QUESTION
Which common cloud service model only offers the customer access to a given application?
Answer:
Software as a Service [Show Less]