CC Dumps

CC Free Practice Test

ISC2 CC: Certified in Cybersecurity (CC)

QUESTION 41

Which type of software testing focuses on examining the source code for vulnerabilities and security issues?

Correct Answer: B

QUESTION 42

EKristal is the security administrator for a large online service provider. Kristal learns that the company is harvesting personal data of its customers and sharing the data with local governments where the company operates, without the knowledge of the users, to allow the governments to persecute users on the basis of their political and philosophical beliefs. The published user agreement states that the company will not share personal user data with any entities without the users' explicit permission. According to the ISC2 Code of Ethics, to whom does Kristal ultimately report in this situation?

Correct Answer: D

QUESTION 43

What federal law requires the use of vulnerability scanning on information systems operated by federal government agencies?

Correct Answer: A

QUESTION 44

A hacker gains access to an organization system without authorization and steal confidential data. What term best describes this ?

Correct Answer: C

QUESTION 45

Which security control mostly used to prevent data breach

Correct Answer: B