ISC2 Cybersecurity Certification Pre- Assessment V1 (Latest 2024/ 2025 Update) 100% Correct Questions and Verified Answers| Grade A
ISC2 Cybersecurity Certification PreAssessment V1 (Latest 2024/ 2025 Update)
100% Correct Questions and Verified
Answers| Grade A
Q: Which of the following probably poses the most risk?
Answer:
A high-likelihood, high-impact event
Q: Druna is a security practitioner tasked with ensuring that laptops are not stolen from the
organization's offices. Which sort of security control would probably be best for this purpose?
Answer:
Physical
Q: Aphrodite is a member of (ISC)² and a data analyst for Triffid Corporation. While Aphrodite
is reviewing user log data, Aphrodite discovers that another Triffid employee is violating the
acceptable use policy and watching streaming videos during work hours. What should Aphrodite
do?
Answer:
Inform Triffid management
Q: Preenka works at an airport. There are red lines painted on the ground next to the runway;
Preenka has been instructed that nobody can step or drive across a red line unless they request,
and get specific permission from, the control tower. This is an example of a(n)______ control.
Answer:
Administrative
Q: The senior leadership of Triffid Corporation decides that the best way to minimize liability
for the company is to demonstrate the company's commitment to adopting best practices
recognized throughout the industry. Triffid management issues a document that explains that
Triffid will follow the best practices published by SANS, an industry body that addresses
computer and information security.
The Triffid document is a ______, and the SANS documents are ________.
Answer:
Policy, standard
Q: Which of the following is an example of a "something you are" authentication factor?
Answer:
A photograph of your face
Q: For which of the following assets is integrity probably the most important security aspect?
Answer:
The file that contains passwords used to authenticate users
Q: Triffid Corporation has a rule that all employees working with sensitive hardcopy
documents must put the documents into a safe at the end of the workday, where they are locked
up until the following workday. What kind of control is the process of putting the documents into
the safe?
Answer:
Administrative
Q: For which of the following systems would the security concept of availability probably be
most important?
Answer:
Medical systems that monitor patient condition in an intensive care unit
Q: A bollard is a post set securely in the ground in order to prevent a vehicle from entering an
area or driving past a certain point. Bollards are an example of ______ controls.
Answer:
Physical
Q: A software firewall is an application that runs on a device and prevents specific types of
traffic from entering that device. This is a type of ________ control.
Answer:
Technical
Q: Sophia is visiting Las Vegas and decides to put a bet on a particular number on a roulette
wheel. This is an example of _________.
Answer:
Acceptance
Q: Jengi is setting up security for a home network. Jengi decides to configure MAC address
filtering on the router, so that only specific devices will be allowed to join the network. This is an
example of a(n)_______ control.
Answer:
Technical
Category | exam bundles |
Comments | 0 |
Rating | |
Sales | 0 |