ISC2 Certified in Cybersecurity Exam Questions

Page: 1 / 14
Total 407 questions
Question 1

Structured way to align IT with business goals while managing risks and meeting all industry and government regulations



Answer : A


Question 2

A structured approach used to oversee and manage risk for an enterprise



Answer : C


Question 3

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called______



Answer : B


Question 4

An employee unintentionally shares confidential information with an unauthorized party. What term best describes this situation?



Answer : D


Question 5

Incident management is also known as



Answer : D


Question 6

What is the main purpose of creating baseline in ensuring system integrity



Answer : A


Question 7

Which penetration testing technique requires the team to do the MOST work and effort?



Answer : D


Page:    1 / 14   
Total 407 questions