ISC Certification Exam Dumps and Interview Q&A
7 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of attack PRIMARILY aims to make a resource inaccessible to its intended users?

  • Data breach
  • Phishing attack
  • Denial of Service (DoS) attack (correct)
  • Man-in-the-middle attack
  • Which of the following is more effective at protecting a door against unauthorized access?

  • Fences
  • Barriers
  • Turnstiles
  • Locks (correct)
  • What is the primary objective of a denial of service attack (DoS)?

  • Intercepting data traffic
  • Compromising the availability of a system or service (correct)
  • Executing malicious code on a system
  • Gaining unauthorized access to a system
  • Which devices primarily aim at collecting and analyzing security events?

    <p>SIEM</p> Signup and view all the answers

    What access control model specifies access to an object based on the subject's role in the organization?

    <p>RBAC</p> Signup and view all the answers

    When a company hires an insurance company to mitigate risk, which risk management technique is being applied?

    <p>Risk transfer</p> Signup and view all the answers

    Which type of attack aims to provide privileged access to a computer while hiding its presence?

    <p>Rootkits</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser