CC - Pre-Assessment Quiz-Answers
CC - Pre-Assessment Quiz-Answers
For which of the following systems would the security concept of availability probably be most
important? (D1, L1.1.1)
Question options:
A)
B)
C)
Online streaming of camera feeds that display historical works of art in museums around the
world
D)
Question options:
A)
Acceptance
B)
Avoidance
C)
Mitigation
D)
Transference
Question options:
A)
Non-repudiation
B)
Multifactor authentication
C)
Biometrics
D)
Privacy
Question options:
A)
Policy
B)
Procedure
C)
Standard
D)
Law
Question options:
A)
Inform (ISC)²
B)
C)
D)
Nothing
Question options:
A)
Natural disaster
B)
C)
D)
Question options:
A)
B)
C)
D)
Question options:
A)
Administrative
B)
Entrenched
C)
Physical
D)
Technical
Question options:
A)
Administrative
B)
Technical
C)
Physical
D)
Nuanced
Question options:
A)
Administrative
B)
Finite
C)
Physical
D)
Technical
Question options:
A)
Physical
B)
Administrative
C)
Critical
D)
Technical
Question options:
A)
Administrative
B)
Tangential
C)
Physical
D)
Technical
Question options:
A)
Vulnerability
B)
Asset
C)
Threat
D)
Likelihood
Question options:
A)
Law
B)
Procedure
C)
Standard
D)
Policy
Question options:
A)
Policy
B)
Procedure
C)
Standard
D)
Law
Question options:
A)
B)
C)
D)
Question options:
A)
B)
C)
D)
Question options:
A)
Physical
B)
Administrative
C)
Substantial
D)
Technical
Question options:
A)
B)
C)
Senior management
D)
Anyone
Question options:
A)
Nothing
B)
C)
D)
Question options:
A)
B)
C)
D)
Question options:
A)
Incident
B)
Event
C)
Attack
D)
Threat
Question options:
A)
Users
B)
Security analysts
C)
Automated tools
D)
Regulators
Question options:
A)
Save money
B)
Impress customers
C)
D)
Question options:
A)
B)
C)
Punish wrongdoers
D)
Save money
Question options:
A)
Intrusion
B)
Exploit
C)
Disclosure
D)
Publication
Question options:
A)
B)
C)
D)
Question options:
A)
Detective
B)
Preventive
C)
Deterrent
D)
Logical
Question options:
A)
Logical access controls can protect the IT environment perfectly; there is no reason to deploy
any other controls
B)
Physical access controls can protect the IT environment perfectly; there is no reason to deploy
any other controls
C)
Administrative access controls can protect the IT environment perfectly; there is no reason to
deploy any other controls
D)
Question options:
A)
Broadcast
B)
Stored
C)
Deleted
D)
Modified
Question options:
A)
Turnstile
B)
Fence
C)
Vacuum
D)
Firewall
Question options:
A)
B)
C)
D)
Question options:
A)
A badge reader
B)
A copper key
C)
D)
Question 34 1 / 1 point
Gelbi is a Technical Support analyst for Triffid, Inc. Gelbi sometimes is required to install or
remove software. Which of the following could be used to describe Gelbi's account? (D3,
L3.1.1)
Question options:
A)
Privileged
B)
Internal
C)
External
D)
User
Question 35 1 / 1 point
Which of the following roles does not typically require privileged account access? (D3, L3.1.1)
Question options:
A)
Security administrator
B)
C)
System administrator
D)
Question options:
A)
Personal preference
B)
Applicable laws
C)
Industry standards
D)
Question options:
A)
B)
C)
Users remember their credentials if they are given time to think about it
D)
Question options:
A)
B)
C)
D)
Question options:
A)
B)
If Trina logs in for Doug, then Doug will never be encouraged to remember credentials without
assistance
C)
D)
Question options:
A)
The subject
B)
The object
C)
The rule
D)
The firmware
Question options:
A)
Increased logging
B)
Multifactor authentication
C)
Increased auditing
D)
Security deposit
Question options:
A)
The subject
B)
The object
C)
The process
D)
The software
Question options:
A)
B)
C)
D)
Barbed wire
Question options:
A)
Defense in depth
B)
Segregation of duties
C)
Least privilege
D)
Dual control
Question options:
A)
B)
C)
D)
Firewalls
Question options:
A)
B)
Anti-malware
C)
D)
Firewall
Question options:
A)
Internet
B)
VLAN
C)
MAC
D)
VPN
Question options:
A)
Water
B)
Dirt
C)
Oxygen-depletion
D)
Gaseous
Question options:
A)
The attackers contact the target prior to the attack, in order to threaten and frighten the target
B)
C)
The power utility company warns customers that the grid will be down and the internet won't be
accessible
D)
Users report unusual systems activity/response to Help Desk or the security office
Question options:
A)
B)
Spoofing
C)
D)
Question options:
A)
HIDS
B)
Anti-malware
C)
Router
D)
SIEM
Question options:
A)
Annual budgeting
B)
C)
D)
Question options:
A)
Philosophical
B)
Remote
C)
Internal
D)
Physical
Question options:
A)
B)
Mail server
C)
Database engine
D)
Question options:
A)
DDOS
B)
Trojan
C)
Side channel
D)
On-path
Question options:
A)
B)
C)
Geophysical address
D)
Terminal address
Question options:
A)
Water
B)
Dirt
C)
Oxygen-depletion
D)
Gaseous
Question options:
A)
Endpoint
B)
Laptop
C)
D)
Firewall
Question options:
A)
Shelf
B)
Closet
C)
Bracket
D)
House
Question options:
A)
B)
C)
D)
Question options:
A)
B)
C)
D)
Question options:
A)
User laptop
B)
IoT
C)
Camera
D)
Firewall
Question options:
A)
Secrecy
B)
Privacy
C)
Inverting
D)
Labeling
Question options:
A)
Protect assets
B)
C)
D)
Question options:
A)
Hashing
B)
Clockwise rotation
C)
Symmetric encryption
D)
Asymmetric encryption
Question options:
A)
Medical
B)
Sensitive
C)
All
D)
Secret
Question options:
A)
Reduce liability
B)
C)
It is a moral imperative
D)
Question options:
A)
Symmetric encryption
B)
Hashing
C)
Asymmetric encryption
D)
VLANs
Question options:
A)
Inventory
B)
Baseline
C)
Identification
D)
Question options:
A)
B)
C)
D)
Question options:
A)
Fragments
B)
Packets
C)
Remanence
D)
Residue
Question options:
A)
B)
C)
D)
Question options:
A)
Expensive
B)
Scalable
C)
D)
Question options:
A)
Restricted
B)
Illegal
C)
Private
D)
All
Question options:
A)
B)
C)
D)