ISC2 Cybersecurity Certification Pre- Assessment V2 (Latest 2024/ 2025 Update) 100% Correct Questions and Verified Answers| Grade A
ISC2 Cybersecurity Certification PreAssessment V2 (Latest 2024/ 2025 Update)
100% Correct Questions and Verified
Answers| Grade A
Q: Sophia is visiting Las Vegas and decides to put a bet on a particular number on a roulette
wheel. This is an example of .
Answer:
Acceptance
Q: In risk management concepts, a(n) is something a security practitioner might
need to protect.
Answer:
Asset
Q: A is a record of something that has occurred.
Answer:
Log
Q: Prachi works as a database administrator for Triffid, Inc. Prachi is allowed to add or delete
users, but is not allowed to read or modify the data in the database itself. When Prachi logs onto
the system, an access control list (ACL) checks to determine which permissions Prachi has.
In this situation, what is the database?
Answer:
The object
Q: Larry and Fern both work in the data center. In order to enter the data center to begin their
workday, they must both present their own keys (which are different) to the key reader, before
the door to the data center opens. Which security concept is being applied in this situation?
Answer:
Dual control
Q: All of the following are typically perceived as drawbacks to biometric systems, except
Answer:
Lack of accuracy
Q: Which of the following is one of the common ways potential attacks are often identified?
Answer:
Users report unusual systems activity/response to Help Desk or the security office
Q: The section of the IT environment that is closest to the external world; where we locate IT
systems that communicate with the Internet.
Answer:
DMZ (demili- tarized zone)
Q: The logical address of a device connected to the network or Internet.
Answer:
In- ternet Protocol (IP) address
Q: Which of the following activities is usually part of the configuration man- agement process,
but is also extremely helpful in countering potential at- tacks?
Category | exam bundles |
Comments | 0 |
Rating | |
Sales | 0 |