Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Newly Released ISC CC Exam PDF

Page: 25 / 30
Total 403 questions

CC - Certified in Cybersecurity Questions and Answers

Question 97

Natalia is concerned that users on her network may be storing sensitive information, such as Social Security numbers, on their hard drives without proper authorization or security controls. What third-party security service can she implement to best detect this activity?

Options:

A.

IDS – Intrusion Detection System

B.

IPS – Intrusion Prevention System

C.

DLP – Data Loss Protection

D.

TLS – Transport Layer Security

Question 98

What are registered ports primarily used for?

Options:

A.

Core TCP/IP protocols

B.

Web servers

C.

In-house applications

D.

Vendor and proprietary applications

Question 99

Which TLS extension is used to optimize the TLS handshake process by reducing the number of round trips between the client and server?

Options:

A.

TLS Renegotiation

B.

TLS Heartbeat

C.

TLS Session Resumption

D.

TLS FastTrack

Question 100

In DAC, a subject granted access can:

Options:

A.

Change security attributes

B.

Choose attributes for new objects

C.

Change access rules

D.

All

Page: 25 / 30
Total 403 questions