ISC2 Cybersecurity Certification Pre- Assessment V1 (Latest 2024/ 2025 Update) 100% Correct Questions and Verified Answers| Grade A

ISC2 Cybersecurity Certification PreAssessment V1 (Latest 2024/ 2025 Update) 100% Correct Questions and Verified Answers| Grade A Q: Which of the following probably poses the most risk? Answer: A high-likelihood, high-impact event Q: Druna is a security practitioner tasked with ensuring that laptops are not stolen from the organization's offices. Which sort of security control would probably be best for this purpose? Answer: Physical Q: Aphrodite is a member of (ISC)² and a data analyst for Triffid Corporation. While Aphrodite is reviewing user log data, Aphrodite discovers that another Triffid employee is violating the acceptable use policy and watching streaming videos during work hours. What should Aphrodite do? Answer: Inform Triffid management Q: Preenka works at an airport. There are red lines painted on the ground next to the runway; Preenka has been instructed that nobody can step or drive across a red line unless they request, and get specific permission from, the control tower. This is an example of a(n)______ control. Answer: Administrative Q: The senior leadership of Triffid Corporation decides that the best way to minimize liability for the company is to demonstrate the company's commitment to adopting best practices recognized throughout the industry. Triffid management issues a document that explains that Triffid will follow the best practices published by SANS, an industry body that addresses computer and information security. The Triffid document is a ______, and the SANS documents are ________. Answer: Policy, standard Q: Which of the following is an example of a "something you are" authentication factor? Answer: A photograph of your face Q: For which of the following assets is integrity probably the most important security aspect? Answer: The file that contains passwords used to authenticate users Q: Triffid Corporation has a rule that all employees working with sensitive hardcopy documents must put the documents into a safe at the end of the workday, where they are locked up until the following workday. What kind of control is the process of putting the documents into the safe? Answer: Administrative Q: For which of the following systems would the security concept of availability probably be most important? Answer: Medical systems that monitor patient condition in an intensive care unit Q: A bollard is a post set securely in the ground in order to prevent a vehicle from entering an area or driving past a certain point. Bollards are an example of ______ controls. Answer: Physical Q: A software firewall is an application that runs on a device and prevents specific types of traffic from entering that device. This is a type of ________ control. Answer: Technical Q: Sophia is visiting Las Vegas and decides to put a bet on a particular number on a roulette wheel. This is an example of _________. Answer: Acceptance Q: Jengi is setting up security for a home network. Jengi decides to configure MAC address filtering on the router, so that only specific devices will be allowed to join the network. This is an example of a(n)_______ control. Answer: Technical 

No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Price $11.00
Add To Cart

Buy Now
Category exam bundles
Comments 0
Rating
Sales 0

Buy Our Plan

We have

The latest updated Study Material Bundle with 100% Satisfaction guarantee

Visit Now
{{ userMessage }}
Processing