ISC2 Cybersecurity Certification Post Assessment V1 (Latest 2024/ 2025 Update) 100% Correct Questions and Verified Answers| Grade A
ISC2 Cybersecurity Certification Post
Assessment V1 (Latest 2024/ 2025 Update)
100% Correct Questions and Verified
Answers| Grade A
Q: Olaf is a member of (ISC)² and a security analyst for Triffid Corporation. During an audit,
Olaf is asked whether Triffid is currently following a particular security practice. Olaf knows
that Triffid is not adhering to that standard in that particular situation, but that saying this to the
auditors will reflect poorly on Triffid. What should Olaf do?
A) Tell the auditors the truth
B) Ask supervisors for guidance
C) Ask (ISC)² for guidance
D) Lie to the auditors
Answer:
Tell the auditors the truth
Q: Which of the following probably poses the most risk?
A) A high-likelihood, high-impact event
B) A high-likelihood, low-impact event
C) A low-likelihood, high-impact event
D) A low-likelihood, low-impact event
Answer:
A high-likelihood, high-impact event
Q: Jengi is setting up security for a home network. Jengi decides to configure MAC address
filtering on the router, so that only specific devices will be allowed to join the network. This is an
example of a(n)_______ control.
A) Physical
B) Administrative
C) Substantial
D) Technical
Answer:
Technical
Q: Sophia is visiting Las Vegas and decides to put a bet on a particular number on a roulette
wheel. This is an example of _________.
A) Acceptance
B) Avoidance
C) Mitigation
D) Transference
Answer:
Acceptance
Q: A system that collects transactional information and stores it in a record in order to show
which users performed which actions is an example of providing ________.
A) Non-repudiation
B) Multifactor authentication
C) Biometrics
D) Privacy
Answer:
Non-repudiation
Q: Tina is an (ISC)² member and is invited to join an online group of IT security enthusiasts.
After attending a few online sessions, Tina learns that some participants in the group are sharing
malware with each other, in order to use it against other organizations online. What should Tina
do?
A) Nothing
B) Stop participating in the group
C) Report the group to law enforcement
D) Report the group to (ISC)²
Answer:
Stop participating in the group
Q: The city of Grampon wants to know where all its public vehicles (garbage trucks, police
cars, etc.) are at all times, so the city has GPS transmitters installed in all the vehicles. What kind
of control is this?
A) Administrative
B) Entrenched
C) Physical
D) Technical
Answer:
Technical
Q: Preenka works at an airport. There are red lines painted on the ground next to the runway;
Preenka has been instructed that nobody can step or drive across a red line unless they request,
and get specific permission from, the control tower. This is an example of a(n)______ control.
A) Physical
B) Administrative
C) Critical
D) Technical
Answer:
Administrative
Q: Aphrodite is a member of (ISC)² and a data analyst for Triffid Corporation. While Aphrodite
is reviewing user log data, Aphrodite discovers that another Triffid employee is violating the
acceptable use policy and watching streaming videos during work hours. What should Aphrodite
do?
A) Inform (ISC)²
B) Inform law enforcement
C) Inform Triffid management
D) Nothing
Answer:
Inform Triffid management
Category | exam bundles |
Comments | 0 |
Rating | |
Sales | 0 |