Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

ISC2 – CC Exam Questions with 100% Correct Answers | Verified | Updated 2024, Exams of Advanced Education

ISC2 – CC Exam Questions with 100% Correct Answers | Verified | Updated 2024 Application Server - Correct Answer-A computer responsible for hosting applications to user workstations. NIST SP 800-82 Rev.2 Asymmetric Encryption - Correct Answer-An algorithm that uses one key to encrypt and a different key to decrypt the input plaintext. Checksum - Correct Answer-A digit representing the sum of the correct digits in a piece of stored or transmitted digital data, against which later comparisons can be made to detect errors in the data. Ciphertext - Correct Answer-The altered form of a plaintext message so it is unreadable for anyone except the intended recipients. In other words, it has been turned into a secret. Classification - Correct Answer-Classification identifies the degree of harm to the organization,

Typology: Exams

2023/2024

Available from 07/16/2024

professoraxel
professoraxel 🇺🇸

3.7

(26)

9.4K documents

1 / 39

Toggle sidebar

Related documents


Partial preview of the text

Download ISC2 – CC Exam Questions with 100% Correct Answers | Verified | Updated 2024 and more Exams Advanced Education in PDF only on Docsity! ISC2 – CC Exam Questions with 100% Correct Answers | Verified | Updated 2024 Application Server - Correct Answer-A computer responsible for hosting applications to user workstations. NIST SP 800-82 Rev.2 Asymmetric Encryption - Correct Answer-An algorithm that uses one key to encrypt and a different key to decrypt the input plaintext. Checksum - Correct Answer-A digit representing the sum of the correct digits in a piece of stored or transmitted digital data, against which later comparisons can be made to detect errors in the data. Ciphertext - Correct Answer-The altered form of a plaintext message so it is unreadable for anyone except the intended recipients. In other words, it has been turned into a secret. Classification - Correct Answer-Classification identifies the degree of harm to the organization, its stakeholders or others pg. 1 professoraxe l that might result if an information asset is divulged to an unauthorized person, process or organization. In short, classification is focused first and foremost on maintaining the confidentiality of the data, based on the data sensitivity. Configuration management - Correct Answer-A process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated. Cryptanalyst - Correct Answer-One who performs cryptanalysis which is the study of mathematical techniques for attempting to defeat cryptographic techniques and/or information systems security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or of the algorithm itself. Cryptography - Correct Answer-The study or applications of methods to secure or protect the meaning and content of messages, files, or other information, usually by disguise, obscuration, or other transformations of that content and meaning. pg. 2 professoraxe l electronic message that is used to represent that file or message and depends on the entire contents of the file or message. A hash function can be considered to be a fingerprint of the file or message. NIST SP 800-152 Hashing - Correct Answer-The process of using a mathematical algorithm against data to produce a numeric value that is representative of that data. Source CNSSI 4009-2015 Information Sharing - Correct Answer-The requirements for information sharing by an IT system with one or more other IT systems or applications, for information sharing to support multiple internal or external organizations, missions, or public programs. NIST SP 800-16 Ingress Monitoring - Correct Answer-Monitoring of incoming network traffic. Message Digest - Correct Answer-A digital signature that uniquely identifies data and has the property such that changing a single bit in the data will cause a completely different message digest to be generated. NISTIR-8011 Vol.3 pg. 5 professoraxe l Operating System - Correct Answer-The software "master control application" that runs the computer. It is the first program loaded when the computer is turned on, and its main component, the kernel, resides in memory at all times. The operating system sets the standards for all application programs (such as the Web server) that run in the computer. The applications communicate with the operating system for most user interface and file management operations. NIST SP 800-44 Version 2 Patch - Correct Answer-A software component that, when installed, directly modifies files or device settings related to a different software component without changing the version number or release details for the related software component. Source: ISO/IEC 19770-2 Patch Management - Correct Answer-The systematic notification, identification, deployment, installation and verification of operating system and application software code revisions. These revisions are known as patches, hot fixes, and service packs. Source: CNSSI 4009 Plaintext - Correct Answer-A message or data in its natural format and in readable form; extremely vulnerable from a confidentiality perspective. pg. 6 professoraxe l Records - Correct Answer-The recordings (automated and/or manual) of evidence of activities performed or results achieved (e.g., forms, reports, test results), which serve as a basis for verifying that the organization and the information system are performing as intended. Also used to refer to units of related data fields (i.e., groups of data fields that can be accessed by a program and that contain the complete set of information on particular items). NIST SP 800-53 Rev. 4 Records Retention - Correct Answer-A practice based on the records life cycle, according to which records are retained as long as necessary, and then are destroyed after the appropriate time interval has elapsed. Remanence - Correct Answer-Residual information remaining on storage media after clearing. NIST SP 800-88 Rev. 1 Request for change (RFC) - Correct Answer-The first stage of change management, wherein a change in procedure or product is sought by a stakeholder. pg. 7 professoraxe l management effort or service provider interaction. NIST 800- 145 Community cloud - Correct Answer-A system in which the cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy and compliance considerations). It may be owned, managed and operated by one or more of the organizations in the community, a third party or some combination of them, and it may exist on or off premises. NIST 800-145 De-encapsulation - Correct Answer-The opposite process of encapsulation, in which bundles of data are unpacked or revealed. Denial-of-Service (DoS) - Correct Answer-The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.) Source: NIST SP 800-27 Rev A pg. 10 professoraxe l Domain Name Service (DNS) - Correct Answer-This acronym can be applied to three interrelated elements: a service, a physical server and a network protocol. Encapsulation - Correct Answer-Enforcement of data hiding and code hiding during all phases of software development and operational use. Bundling together data and methods is the process of encapsulation; its opposite process may be called unpacking, revealing, or using other terms. Also used to refer to taking any set of data and packaging it or hiding it in another data structure, as is common in network protocols and encryption. Encryption - Correct Answer-The process and act of converting the message from its plaintext to ciphertext. Sometimes it is also referred to as enciphering. The two terms are sometimes used interchangeably in literature and have similar meanings. File Transfer Protocol (FTP) - Correct Answer-The internet protocol (and program) used to transfer files between hosts. Fragment attack - Correct Answer-In a fragment attack, an attacker fragments traffic in such a way that a system is unable to put data packets back together. pg. 11 professoraxe l Hardware - Correct Answer-The physical parts of a computer and related devices. Hybrid cloud - Correct Answer-A combination of public cloud storage and private cloud storage where some critical data resides in the enterprise's private cloud while other data is stored and accessible from a public cloud storage provider. Infrastructure as a Service (IaaS) - Correct Answer-The provider of the core computing, storage and network hardware and software that is the foundation upon which organizations can build and then deploy applications. IaaS is popular in the data center where software and servers are purchased as a fully outsourced service and usually billed on usage and how much of the resource is used. Internet Control Message Protocol (ICMP) - Correct Answer-An IP network protocol standardized by the Internet Engineering Task Force (IETF) through RFC 792 to determine if a particular service or host is available. Internet Protocol (IPv4) - Correct Answer-Standard protocol for transmission of data from source to destinations in packet- pg. 12 professoraxe l Public cloud - Correct Answer-The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. NIST SP 800-145 Simple Mail Transport Protocol (SMTP) - Correct Answer-The standard communication protocol for sending and receiving emails between senders and receivers. Software - Correct Answer-Computer programs and associated data that may be dynamically written or modified during execution. NIST SP 80--37 Rev. 2 Software as a Service (SaaS) - Correct Answer-The cloud customer uses the cloud provider's applications running within a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Derived from NIST 800-145 pg. 15 professoraxe l Spoofing - Correct Answer-Faking the sending address of a transmission to gain illegal entry into a secure system. CNSSI 4009-2015 Transport Control Protocol/Internet Protocol (TCP/IP) Model - Correct Answer-Internetworking protocol model created by the IETF, which specifies four layers of functionality: Link layer (physical communications), Internet Layer (network-to- network communication), Transport Layer (basic channels for connections and connectionless exchange of data between hosts), and Application Layer, where other protocols and user applications programs make use of network services. VLAN - Correct Answer-A virtual local area network (VLAN) is a logical group of workstations, servers, and network devices that appear to be on the same LAN despite their geographical distribution. VPN - Correct Answer-A virtual private network (VPN), built on top of existing networks, that can provide a secure communications mechanism for transmission between networks. pg. 16 professoraxe l WLAN - Correct Answer-A wireless area network (WLAN) is a group of computers and devices that are located in the same vicinity, forming a network based on radio transmissions rather than wired connections. A Wi-Fi network is a type of WLAN. Zenmap - Correct Answer-The graphical user interface (GUI) for the Nmap Security Scanner, an open-source application that scans networks to determine everything that is connected as well as other information. Zero Trust - Correct Answer-Removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset. Microsegmentation of workloads is a tool of the model. Audit - Correct Answer-Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures. NIST SP 1800-15B Crime Prevention through Environmental Design (CPTED) - Correct Answer-An architectural approach to the design of pg. 17 professoraxe l Logical Access Control Systems - Correct Answer-An automated system that controls an individual's ability to access one or more computer system resources, such as a workstation, network, application or database. A logical access control system requires the validation of an individual's identity through some mechanism, such as a PIN, card, biometric or other token. It has the capability to assign different access privileges to different individuals depending on their roles and responsibilities in an organization. NIST SP 800-53 Rev.5. Mandatory Access Control - Correct Answer-Access control that requires the system itself to manage access controls in accordance with the organization's security policies. Mantrap - Correct Answer-An entrance to a building or an area that requires people to pass through two doors with only one door opened at a time. Object - Correct Answer-Passive information system-related entity (e.g., devices, files, records, tables, processes, programs, domains) containing or receiving information. Access to an object (by a subject) implies access to the information it contains. See subject. Source: NIST SP 800-53 Rev 4 pg. 20 professoraxe l Physical Access Controls - Correct Answer-Controls implemented through a tangible mechanism. Examples include walls, fences, guards, locks, etc. In modern organizations, many physical control systems are linked to technical/logical systems, such as badge readers connected to door locks. Principle of Least Privilege - Correct Answer-The principle that users and programs should have only the minimum privileges necessary to complete their tasks. NIST SP 800-179 Privileged Account - Correct Answer-An information system account with approved authorizations of a privileged user. NIST SP 800-53 Rev. 4 Ransomware - Correct Answer-A type of malicious software that locks the computer screen or files, thus preventing or limiting a user from accessing their system and data until money is paid. Role-based access control (RBAC) - Correct Answer-An access control system that sets up user permissions based on roles. pg. 21 professoraxe l Rule - Correct Answer-An instruction developed to allow or deny access to a system by comparing the validated identity of the subject to an access control list. Segregation of Duties - Correct Answer-The practice of ensuring that an organizational process cannot be completed by a single person; forces collusion as a means to reduce insider threats. Also commonly known as Separation of Duties. Subject - Correct Answer-Generally an individual, process or device causing information to flow among objects or change to the system state. Source: NIST SP800-53 R4 Technical Controls - Correct Answer-The security controls (i.e., safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software or firmware components of the system. Turnstile - Correct Answer-A one-way spinning door or barrier that allows only one person at a time to enter a building or pass through an area. pg. 22 professoraxe l performed at an acceptable level within a predetermined period following a disruption. Event - Correct Answer-Any observable occurrence in a network or system. Source: NIST SP 800-61 Rev 2 Exploit - Correct Answer-A particular attack. It is named this way because these attacks exploit system vulnerabilities. Incident - Correct Answer-An event that actually or potentially jeopardizes the confidentiality, integrity or availability of an information system or the information the system processes, stores or transmits. Incident Handling - Correct Answer-The mitigation of violations of security policies and recommended practices. Source: NIST SP 800-61 Rev 2 Incident Response (IR) - Correct Answer-The mitigation of violations of security policies and recommended practices. Source: NIST SP 800-61 Rev 2 pg. 25 professoraxe l Incident Response Plan (IRP) - Correct Answer-The documentation of a predetermined set of instructions or procedures to detect, respond to and limit consequences of a malicious cyberattack against an organization's information systems(s). Source: NIST SP 800-34 Rev 1 Intrusion - Correct Answer-A security event, or combination of security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system or system resource without authorization. Source: IETF RFC 4949 Ver 2 Security Operations Center - Correct Answer-A centralized organizational function fulfilled by an information security team that monitors, detects and analyzes events on the network or system to prevent and resolve issues before they result in business disruptions. Vulnerability - Correct Answer-Weakness in an information system, system security procedures, internal controls or implementation that could be exploited or triggered by a threat source. Source: NIST SP 800-128. pg. 26 professoraxe l Zero Day - Correct Answer-A previously unknown system vulnerability with the potential of exploitation without risk of detection or prevention because it does not, in general, fit recognized patterns, signatures or methods. Adequate Security - Correct Answer-Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information. Source: OMB Circular A-130 Administrative Controls - Correct Answer-Controls implemented through policy and procedures. Examples include access control processes and requiring multiple personnel to conduct a specific operation. Administrative controls in modern environments are often enforced in conjunction with physical and/or technical controls, such as an access-granting policy for new users that requires login and approval by the hiring manager. Artificial Intelligence - Correct Answer-The ability of computers and robots to simulate human intelligence and behavior. pg. 27 professoraxe l Data Integrity - Correct Answer-The property that data has not been altered in an unauthorized manner. Data integrity covers data in storage, during processing and while in transit. Source: NIST SP 800-27 Rev A Encryption - Correct Answer-The process and act of converting the message from its plaintext to ciphertext. Sometimes it is also referred to as enciphering. The two terms are sometimes used interchangeably in literature and have similar meanings. General Data Protection Regulation (GDPR) - Correct Answer- In 2016, the European Union passed comprehensive legislation that addresses personal privacy, deeming it an individual human right. Governance - Correct Answer-The process of how an organization is managed; usually includes all aspects of how decisions are made for that organization, such as policies, roles, and procedures the organization uses to make those decisions. Health Insurance Portability and Accountability Act (HIPAA) - Correct Answer-This U.S. federal law is the most important healthcare information regulation in the United States. It pg. 30 professoraxe l directs the adoption of national standards for electronic healthcare transactions while protecting the privacy of individual's health information. Other provisions address fraud reduction, protections for individuals with health insurance and a wide range of other healthcare-related activities. Est. 1996. Impact - Correct Answer-The magnitude of harm that could be caused by a threat's exercise of a vulnerability. Information Security Risk - Correct Answer-The potential adverse impacts to an organization's operations (including its mission, functions and image and reputation), assets, individuals, other organizations, and even the nation, which results from the possibility of unauthorized access, use, disclosure, disruption, modification or destruction of information and/or information systems. Integrity - Correct Answer-The property of information whereby it is recorded, used and maintained in a way that ensures its completeness, accuracy, internal consistency and usefulness for a stated purpose. pg. 31 professoraxe l International Organization of Standards (ISO) - Correct Answer-The ISO develops voluntary international standards in collaboration with its partners in international standardization, the International Electro-technical Commission (IEC) and the International Telecommunication Union (ITU), particularly in the field of information and communication technologies. Internet Engineering Task Force (IETF) - Correct Answer-The internet standards organization, made up of network designers, operators, vendors and researchers, that defines protocol standards (e.g., IP, TCP, DNS) through a process of collaboration and consensus. Source: NIST SP 1800-16B Likelihood - Correct Answer-The probability that a potential vulnerability may be exercised within the construct of the associated threat environment. Likelihood of Occurrence - Correct Answer-A weighted factor based on a subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability or set of vulnerabilities. pg. 32 professoraxe l Qualitative Risk Analysis - Correct Answer-A method for risk analysis that is based on the assignment of a descriptor such as low, medium or high. Source: NISTIR 8286 Quantitative Risk Analysis - Correct Answer-A method for risk analysis where numerical values are assigned to both impact and likelihood based on statistical probabilities and monetarized valuation of loss or gain. Source: NISTIR 8286 Risk - Correct Answer-A possible event which can have a negative impact upon the organization. Risk Acceptance - Correct Answer-Determining that the potential benefits of a business function outweigh the possible risk impact/likelihood and performing that business function with no other action. Risk Assessment - Correct Answer-The process of identifying and analyzing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals and other organizations. The analysis performed as part of risk management which incorporates threat and vulnerability analyses and considers mitigations provided by security controls planned or in place. pg. 35 professoraxe l Risk Avoidance - Correct Answer-Determining that the impact and/or likelihood of a specific risk is too great to be offset by the potential benefits and not performing a certain business function because of that determination. Risk Management - Correct Answer-The process of identifying, evaluating and controlling threats, including all the phases of risk context (or frame), risk assessment, risk treatment and risk monitoring. Risk Management Framework - Correct Answer-A structured approach used to oversee and manage risk for an enterprise. Source: CNSSI 4009 Risk Mitigation - Correct Answer-Putting security controls in place to reduce the possible impact and/or likelihood of a specific risk. Risk Tolerance - Correct Answer-The level of risk an entity is willing to assume in order to achieve a potential desired result. Source: NIST SP 800-32. Risk threshold, risk appetite and acceptable risk are also terms used synonymously with risk tolerance. pg. 36 professoraxe l Risk Transference - Correct Answer-Paying an external party to accept the financial impact of a given risk. Risk Treatment - Correct Answer-The determination of the best way to address an identified risk. Security Controls - Correct Answer-The management, operational and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity and availability of the system and its information. Source: FIPS PUB 199 Sensitivity - Correct Answer-A measure of the importance assigned to information by its owner, for the purpose of denoting its need for protection. Source: NIST SP 800-60 Vol 1 Rev 1 Single-Factor Authentication - Correct Answer-Use of just one of the three available factors (something you know, something you have, something you are) to carry out the authentication process being requested. pg. 37 professoraxe l