Q: 11
Which of the following is NOT an ethical canon of the ISC2?
Options
Discussion
B/C? Seen a similar question in some exam dumps and wasn't sure if "active and qualified" is actually part of the canons.
B
I'm a bit lost but pretty sure that's not the exact wording in the ISC2 canons. I remember it's more like "diligent and competent" for serving principals, not "active and qualified." Can anyone else confirm?
Be respectful. No spam.
Q: 12
What is the main purpose of an Acceptable Use Policy (AUP)?
Options
Discussion
Anyone else see this exact wording in the official practice or guide? Feels super similar to what I studied.
Be respectful. No spam.
Q: 13
Suppose that an organization wants to implement measures to strengthen its detective access controls.
Which one of these tools should they implement?
Options
Discussion
C or D. Encryption feels right for protecting data but IDS (C) might be more about detection, not prevention.
Be respectful. No spam.
Q: 14
Which of these is the PRIMARY objective of the PCI-DSS standard?
Options
Discussion
Its D, PCI-DSS is focused on protecting credit card payments not PII or PHI.
Be respectful. No spam.
Q: 15
Which category of cloud services does a ready-to-use email service fall into?
Options
Discussion
Maybe B. A ready-to-use email service feels like a platform because you don’t manage the servers, just the app itself. I usually think of PaaS for things hosted and managed but not quite pure software. Not totally sure so open to other ideas.
Be respectful. No spam.
Q: 16
In unified cloud storage, which solution can be used to separate access to patient records from
administrative data without moving servers into different networks?
Options
Discussion
Option B VLAN segmentation. Super clear scenario in the question, VLANs are great for logical separation in shared cloud setups.
Had exactly this question on my exam, 100% B. VLAN segmentation lets you keep traffic apart without changing networks.
Be respectful. No spam.
Q: 17
What is the best technology for detecting unauthorized storage of sensitive data on hard drives?
Options
Discussion
A DLP
For me, A. DLP is built for catching sensitive data at rest on drives, not IDS or IPS.
Be respectful. No spam.
Q: 18
In which of the following access control models can the creator of an object delegate permission?
Options
Discussion
D imo, but does the question mean "best suited for delegation" or just "can technically delegate"? If they're asking about actual owner control, that rules out MAC right away.
Be respectful. No spam.
Q: 19
Which of the following is NOT a feature of a cryptographic hash function?
Options
Discussion
C
Hash functions aren’t reversible, that’s kind of the whole point. Once data is hashed you can’t get the original input back. The other choices are all typical properties for a good hash function. Pretty sure it’s C.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2