Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Exactprep CC Questions

Page: 8 / 30
Total 403 questions

CC - Certified in Cybersecurity Questions and Answers

Question 29

Ignoring a risk and continuing business operations is known as:

Options:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk avoidance

D.

Risk transfer

Question 30

A set of instructions to detect, respond to, and recover from security incidents is a:

Options:

A.

BCP

B.

IRP

C.

DRP

D.

None

Question 31

What is the primary purpose of a honeytoken in cybersecurity?

Options:

A.

To lure and detect attackers

B.

To encrypt sensitive data

C.

To enhance network performance

D.

To manage user access

Question 32

When is the Business Continuity Plan (BCP) enacted?

Options:

A.

When there is an event

B.

When there is an incident

C.

When there is a loss of business operations

D.

When there is a natural disaster

Page: 8 / 30
Total 403 questions