Question 37

In the context of cybersecurity, typical threat actors include the following:

Correct Answer:D

Question 38

When is the Business Continuity Plan Enacted?

Correct Answer:C

Question 39

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n)

Correct Answer:B

Question 40

255.255.255.0 Address represents

Correct Answer:C

Question 41

Which device is used to control traffic flow in network

Correct Answer:D

Question 42

What is the primary factor in the reliability of information and system

Correct Answer:C

START CC EXAM