Question 13

Which of the following uses registered port

Correct Answer:D

Question 14

What is sensitivity in the context of confidentiality

Correct Answer:C

Question 15

The means by which a threat actor carries out their objectives

Correct Answer:B

Question 16

Scans networks to determine everything that is connected as well as other information.

Correct Answer:D

Question 17

A cyber security professional observes an unusual occurrence in the network or system. What term best describes this situations

Correct Answer:C

Question 18

When the ISC2 Mail server sends mail to other mail servers it becomes —?

Correct Answer:D

START CC EXAM