本日更新の2025年02月試験エンジンとPDF CCテスト無料!
究極のガイド準備CC正確なPDF解答
72、A _____ is a record of something that has occurred.
73、A vendor sells a particular operating system (OS). In order to deploy the OS securely on different platforms, the vendor publishes several sets of instructions on how to install it, depending on which platform the customer is using. This is an example of ______.
74、Log data should be kept ______.
75、A device typically accessed by multiple users, often intended for a single purpose, such as managing email or web pages.
76、Larry and Fern both work in the data center. In order to enter the data center to begin their workday, they must both present their own keys (which are different) to the key reader, before the door to the data center opens.Which security concept is being applied in this situation?
77、“Wiring _____” is a common term meaning “a place where wires/conduits are often run, and equipment can be placed, in order to facilitate the use of local networks.”
78、In order for a biometric security to function properly, an authorized person’s physiological data must be ______.
79、Cyril wants to ensure all the devices on his company’s internal IT environment are properly synchronized. Which of the following protocols would aid in this effort?
80、Security needs to be provided to ____ data.
81、As an IT Security professional, you are expected to perform due care. What does this mean?Response:
82、A system that collects transactional information and stores it in a record in order to show which users performed which actions is an example of providing ________.
83、An attacker outside the organization attempts to gain access to the organization’s internal files. This is an example of a(n) ______.
84、What is the overall objective of a disaster recovery (DR) effort?
85、A tool that inspects outbound traffic to reduce potential threats.
86、Security controls on log data should reflect ________.
87、Cheryl is browsing the Web. Which of the following protocols is she probably using?
88、Ludwig is a security analyst at Triffid, Inc. Ludwig notices network traffic that might indicate an attack designed to affect the availability of the environment. Which of the following might be the attack Ludwig sees?
89、Which common cloud deployment model typically features only a single customer’s data/functionality stored on specific systems/hardware?
90、The Triffid Corporation publishes a strategic overview of the company’s intent to secure all the data the company possesses. This document is signed by Triffid senior management. What kind of document is this?
91、The concept that the deployment of multiple types of controls provides better security than using a single type of control.
92、Which of the following is an example of a “something you are” authentication factor?
93、A software firewall is an application that runs on a device and prevents specific types of traffic from entering that device. This is a type of ________ control.
94、Data _____ is data left behind on systems/media after normal deletion procedures have been attempted.
合格させるISCはGoShiken試験問題集:https://www.goshiken.com/ISC/CC-mondaishu.html
メールアドレスが公開されることはありません。 ※ が付いている欄は必須項目です
コメント ※
名前 ※
メール ※
サイト
次回のコメントで使用するためブラウザーに自分の名前、メールアドレス、サイトを保存する。