Spring Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

CC - Certified in Cybersecurity Question and Answers

CC - Certified in Cybersecurity

Last Update Feb 28, 2026
Total Questions : 403

We are offering FREE CC ISC exam questions. All you do is to just go and sign up. Give your details, prepare CC free exam questions and then go for complete pool of CC - Certified in Cybersecurity test questions that will help you more.

CC pdf

CC PDF

$36.75  $104.99
CC Engine

CC Testing Engine

$43.75  $124.99
CC PDF + Engine

CC PDF + Testing Engine

$57.75  $164.99
Questions 1

What goal of security is enhanced by a strong business continuity program?

Options:

A.  

Non-repudiation

B.  

Availability

C.  

Confidentiality

D.  

Integrity

Discussion 0
Questions 2

Which one of the following controls is NOT particularly effective against the insider threat?

Options:

A.  

Least privilege

B.  

Background checks

C.  

Firewalls

D.  

Separation of duties

Discussion 0
Questions 3

A team activates procedures to mitigate a cyberattack. What plan is this?

Options:

A.  

Business Continuity Plan

B.  

Incident Response Plan

C.  

Disaster Recovery Plan

D.  

Security Operations Plan

Discussion 0
Questions 4

Embedded systems and network-enabled devices that communicate with the Internet are considered:

Options:

A.  

Endpoint

B.  

Node

C.  

IoT

D.  

Router

Discussion 0
Questions 5

What is the primary goal of input validation?

Options:

A.  

Secure storage

B.  

Prevent unauthorized access

C.  

Prevent code injection attacks

D.  

Encrypt data

Discussion 0
Questions 6

Removing the belief that a network has any trusted space and enforcing security at the most granular level is known as:

Options:

A.  

Zero Trust

B.  

Defense in Depth

C.  

Least Privilege

D.  

All

Discussion 0
Questions 7

XenServer, LVM, Hyper-V, and ESXi are:

Options:

A.  

Type 2 hypervisors

B.  

Type 1 hypervisors

C.  

Both

D.  

None

Discussion 0
Questions 8

A centralized organizational function that monitors, detects, and analyzes security events to prevent disruptions is called:

Options:

A.  

IRP

B.  

BCP

C.  

SOC

D.  

DRP

Discussion 0
Questions 9

John is concerned about a possible conflict of interest from a consulting side job. Which source should he consult?

Options:

A.  

ISC2 Code of Ethics

B.  

Organizational Code of Ethics

C.  

Country Code of Ethics

D.  

Organizational Security Policy

Discussion 0
Questions 10

Example of token-based authentication:

Options:

A.  

Kerberos

B.  

Basic

C.  

OAuth

D.  

NTLM

Discussion 0
Questions 11

Ping flood attacks target which OSI layer?

Options:

A.  

Layer 4

B.  

Layer 3

C.  

Layer 5

D.  

Layer 6

Discussion 0
Questions 12

Which technology should be implemented to increase the work effort required for buffer overflow attacks?

Options:

A.  

Address Space Layout Randomization

B.  

Memory induction application

C.  

Input memory isolation

D.  

Read-only memory integrity checks

Discussion 0
Questions 13

What is the purpose of multi-factor authentication (MFA) in IAM?

Options:

A.  

To simplify user access

B.  

To eliminate the need for authentication

C.  

To add an additional layer of security by requiring multiple forms of verification

D.  

To grant unrestricted access to all users

Discussion 0
Questions 14

Malware that disguises itself as legitimate software is called:

Options:

A.  

Worm

B.  

Trojan

C.  

Virus

D.  

Ransomware

Discussion 0
Questions 15

What does internal consistency of information refer to?

Options:

A.  

Accurate and complete data

B.  

Protection from errors

C.  

All data instances being identical

D.  

Same display format

Discussion 0
Questions 16

The process of applying secure configurations to reduce the attack surface is known as:

Options:

A.  

Security assessment

B.  

Security evaluation

C.  

Security benchmark

D.  

Security hardening

Discussion 0
Questions 17

A popular way of implementing the principle of least privilege is:

Options:

A.  

MAC

B.  

DAC

C.  

RBAC

D.  

ABAC

Discussion 0
Questions 18

Port forwarding is also known as:

Options:

A.  

Port mapping

B.  

Tunneling

C.  

Punch-through

D.  

All

Discussion 0
Questions 19

A transaction over $50,000 requires approval from both a manager and an accountant. Which concept applies?

Options:

A.  

MAC

B.  

Defense in Depth

C.  

Two-Person Integrity

D.  

Principle of Least Privilege

Discussion 0
Questions 20

Example of a technical control:

Options:

A.  

Security guard

B.  

GPS installed in a vehicle to track location

C.  

Door lock

D.  

None

Discussion 0
Questions 21

255.255.255.0 represents:

Options:

A.  

Broadcast address

B.  

Unicast address

C.  

Subnet mask

D.  

Global address

Discussion 0
Questions 22

Shaun is planning to protect data in all states (at rest, in motion, and in use), defending against data leakage. What is the BEST solution to implement?

Options:

A.  

End-to-end encryption

B.  

Hashing

C.  

DLP

D.  

Threat modeling

Discussion 0
Questions 23

A set of rules that everyone must comply with and that usually carry monetary penalties for noncompliance are:

Options:

A.  

Standards

B.  

Policies

C.  

Procedures

D.  

Laws or regulations

Discussion 0
Questions 24

Which TLS extension is used to optimize the TLS handshake process by reducing the number of round trips between the client and server?

Options:

A.  

TLS Renegotiation

B.  

TLS Heartbeat

C.  

TLS Session Resumption

D.  

TLS FastTrack

Discussion 0
Questions 25

Which uses encrypted, machine-generated codes to verify a user's identity?

Options:

A.  

Basic authentication

B.  

Form-based authentication

C.  

Token-based authentication

D.  

All

Discussion 0
Questions 26

Which type of network is set up similar to the internet but is private to an organization? Select the MOST appropriate answer.

Options:

A.  

Extranet

B.  

VLAN

C.  

Intranet

D.  

VPN

Discussion 0
Questions 27

What does the termbusinessin business continuity planning refer to?

Options:

A.  

The financial performance of the organization

B.  

The technical systems of the organization

C.  

The operational aspects of the organization

D.  

The physical infrastructure of the organization

Discussion 0
Questions 28

A device that forwards traffic to the port of a known destination device is a:

Options:

A.  

Switch

B.  

Hub

C.  

Router

D.  

Ethernet

Discussion 0
Questions 29

What is the main purpose of using multi-factor authentication (MFA) in a security system?

Options:

A.  

To prevent data breaches

B.  

To protect against malware

C.  

To ensure data integrity

D.  

To add an extra layer of security to user authentication

Discussion 0
Questions 30

A scam where a malicious website is made to look exactly like a trusted site is called:

Options:

A.  

DoS

B.  

Virus

C.  

Spoofing

D.  

Phishing

Discussion 0
Questions 31

Which security control is most commonly used to prevent data breaches?

Options:

A.  

Physical control

B.  

Logical control

C.  

Administrative control

D.  

RBAC

Discussion 0
Questions 32

Exhibit.

What is the purpose of a Security Information and Event Management (SIEM) system?

Options:

A.  

Encrypting files

B.  

Monitoring and analyzing security events -

C.  

Blocking malicious websites

D.  

Managing user passwords

Discussion 0
Questions 33

A security event in which an intruder gains or attempts unauthorized access to a system is called:

Options:

A.  

Intrusion

B.  

Exploit

C.  

Threat

D.  

Attack

Discussion 0
Questions 34

Which OSI layer associates MAC addresses with network devices?

Options:

A.  

Physical layer

B.  

Network layer

C.  

Data Link layer

D.  

Transport layer

Discussion 0
Questions 35

Which works by encapsulating one packet inside another?

Options:

A.  

Network segmentation

B.  

Load balancing

C.  

Tunneling

D.  

Data encryption

Discussion 0
Questions 36

Methods or mechanisms used to gain unauthorized access are called:

Options:

A.  

Attacker

B.  

Threat vector

C.  

Threat

D.  

Threat actor

Discussion 0
Questions 37

How many bits represent the Organizationally Unique Identifier (OUI) in MAC addresses?

Options:

A.  

16 bits

B.  

48 bits

C.  

24 bits

D.  

32 bits

Discussion 0
Questions 38

What is the purpose of defense in depth?

Options:

A.  

Implement only technical controls

B.  

Provide unrestricted access

C.  

Establish multiple layered security controls

D.  

Guarantee no cyberattacks

Discussion 0
Questions 39

A company wants employees to access resources from anywhere in the world. Which access control model is best?

Options:

A.  

DAC

B.  

RBAC

C.  

MAC

D.  

ABAC

Discussion 0
Questions 40

Which is very likely to be used in a Disaster Recovery effort?

Options:

A.  

Guard dogs

B.  

Contract personnel

C.  

Data backups

D.  

Anti-malware solutions

Discussion 0
Questions 41

A newly enforced BYOD policy represents which control type?

Options:

A.  

Physical control

B.  

Logical control

C.  

Administrative control

D.  

Technical control

Discussion 0
Questions 42

Which attack most effectively maintains remote access and control over a victim’s computer?

Options:

A.  

Phishing

B.  

Trojans

C.  

XSS

D.  

Rootkits

Discussion 0
Questions 43

Which of the following is a characteristic of cloud computing?

Options:

A.  

Broad network access

B.  

Rapid elasticity

C.  

Measured service

D.  

All

Discussion 0
Questions 44

What is the primary goal of network segmentation in cybersecurity?

Options:

A.  

To increase network speed

B.  

To isolate and protect critical assets

C.  

To centralize data storage

D.  

To expand network coverage

Discussion 0
Questions 45

A system architecture where one instance serves multiple user groups:

Options:

A.  

Multithreading

B.  

Multiprocessing

C.  

Multitenancy

D.  

Multi-cloud

Discussion 0
Questions 46

An organization develops procedures to restore critical business processes after a major disruption. What plan is this?

Options:

A.  

BCP

B.  

IRP

C.  

DRP

D.  

None

Discussion 0
Questions 47

Port used by DNS.

Options:

A.  

53

B.  

80

C.  

45

D.  

54

Discussion 0
Questions 48

What is the recommended fire suppression system for server rooms?

Options:

A.  

Foam-based

B.  

Water-based

C.  

Powder-based

D.  

Clean-agent gas systems (e.g., FM-200 / Inergen)

Discussion 0
Questions 49

Difference between sniffing and spoofing:

Options:

A.  

Sniffing intercepts traffic; spoofing disguises identity

B.  

Snooping intercepts traffic; sniffing disguises identity

C.  

Both are the same

D.  

Sniffing is not a threat

Discussion 0
Questions 50

Type 1 authentication poses which risks?

Options:

A.  

Users may share their credentials with others

B.  

Users may forget their passwords

C.  

Passwords may be intercepted and stolen

D.  

All

Discussion 0
Questions 51

A hacker launches a specific attack to exploit a known vulnerability. This is called:

Options:

A.  

Breach

B.  

Event

C.  

Exploit

D.  

Intrusion

Discussion 0
Questions 52

How often should an organization test its BCP?

Options:

A.  

Continually

B.  

Annually

C.  

Routinely

D.  

Daily

Discussion 0
Questions 53

What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?

Options:

A.  

Least privilege

B.  

Two-person control

C.  

Job rotation

D.  

Separation of privileges

Discussion 0
Questions 54

Which type of control is used to restore systems or processes to their normal state after an attack?

Options:

A.  

Compensatory control

B.  

Recovery control

C.  

Detective control

D.  

Corrective control

Discussion 0
Questions 55

Which is related to privacy?

Options:

A.  

GDPR

B.  

FIPS

C.  

MOU

D.  

All

Discussion 0
Questions 56

If a device is found to be non-compliant with the security baseline, what action should the security team take?

Options:

A.  

Report

B.  

Evaluate

C.  

Ignore

D.  

Disable or isolate it into a quarantine area until it can be checked and updated

Discussion 0
Questions 57

Faking the sender address to gain unauthorized access is known as:

Options:

A.  

Phishing

B.  

ARP

C.  

Spoofing

D.  

All

Discussion 0
Questions 58

A standard that defines wired communication for network devices:

Options:

A.  

Switch

B.  

Hub

C.  

Router

D.  

Ethernet

Discussion 0
Questions 59

Which of the following vulnerabilities cannot be discovered during a routine vulnerability assessment?

Options:

A.  

Zero-day vulnerability

B.  

Kernel flaw

C.  

Buffer overflow

D.  

File and directory permissions

Discussion 0
Questions 60

Which is the loopback address?

Options:

A.  

::1

B.  

127.0.0.1

C.  

255.255.255.0

D.  

Both A and B

Discussion 0
Questions 61

Token Ring operates at which OSI layer?

Options:

A.  

Application

B.  

Network

C.  

Transport

D.  

Physical

Discussion 0
Questions 62

The highest-level governance documents approved by management are:

Options:

A.  

Standards

B.  

Policies

C.  

Procedures

D.  

Laws or regulations

Discussion 0
Questions 63

Which is an example of a deterrent control?

Options:

A.  

Biometric

B.  

Guard dog

C.  

Encryption

D.  

Turnstile

Discussion 0
Questions 64

Which type of risk involves unauthorized use or disclosure of confidential information such as passwords, financial data, or personal information?

Options:

A.  

Compliance risk

B.  

Reputational risk

C.  

Operational risk

D.  

Information risk

Discussion 0
Questions 65

A structured approach used to oversee and manage risk for an enterprise is called:

Options:

A.  

Risk assessment

B.  

Risk threshold

C.  

Risk Management Framework

D.  

Risk appetite

Discussion 0
Questions 66

A measure of the degree to which an organization depends on information or systems to achieve its mission is called:

Options:

A.  

Availability

B.  

Criticality

C.  

Authorization

D.  

Confidentiality

Discussion 0
Questions 67

In Mandatory Access Control (MAC), which statement is true?

Options:

A.  

Users access data based on need-to-know

B.  

Access controls cannot be changed except by administrators

C.  

Data owners modify access

D.  

Users control permissions

Discussion 0
Questions 68

What does Personally Identifiable Information (PII) pertain to?

Options:

A.  

Information about an individual's health status

B.  

Data about an individual that could be used to identify them

C.  

Trade secrets, research, business plans, and intellectual property

D.  

The importance assigned to information by its owner

Discussion 0
Questions 69

Risk tolerance is also known as:

Options:

A.  

Risk threshold

B.  

Risk appetite

C.  

Acceptable risk

D.  

All

Discussion 0
Questions 70

Which can be considered a fingerprint of a file or message?

Options:

A.  

Hashing

B.  

Encryption

C.  

Decryption

D.  

Encoding

Discussion 0
Questions 71

Governments can impose financial penalties as a consequence of breaking a:

Options:

A.  

Standard

B.  

Regulation

C.  

Policy

D.  

Procedure

Discussion 0
Questions 72

What is the end goal of a Disaster Recovery Plan (DRP)?

Options:

A.  

All systems backed up

B.  

DR site activated

C.  

Infrastructure relocated

D.  

Business restored to last-known reliable operations

Discussion 0
Questions 73

Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?

Options:

A.  

Non-repudiation

B.  

Integrity

C.  

Availability

D.  

Confidentiality

Discussion 0
Questions 74

When operating in a cloud environment, which cloud deployment model provides security teams with the greatest access to forensic information?

Options:

A.  

FaaS

B.  

SaaS

C.  

PaaS

D.  

IaaS

Discussion 0
Questions 75

The method of distributing network traffic equally across a pool of resources is called:

Options:

A.  

VLAN

B.  

DNS

C.  

VPN

D.  

Load balancing

Discussion 0
Questions 76

What is the primary goal of incident management?

Options:

A.  

To protect life, health, and safety

B.  

To reduce the impact of an incident

C.  

To prepare for any incident

D.  

To resume interrupted operations as soon as possible

Discussion 0
Questions 77

A weighted factor based on the probability that a threat will exploit a vulnerability is called:

Options:

A.  

Likelihood of occurrence

B.  

Threat vector

C.  

Risk

D.  

Impact

Discussion 0
Questions 78

A tool used to inspect outbound traffic to reduce threats:

Options:

A.  

Anti-malware

B.  

NIDS

C.  

DLP

D.  

Firewall

Discussion 0
Questions 79

A company wants to ensure that its employees can evacuate the building in case of an emergency. Which physical control is best suited?

Options:

A.  

Fire alarms

B.  

Exit signs

C.  

Emergency lighting

D.  

Emergency exit doors

Discussion 0
Questions 80

Which cloud service model provides the most suitable environment for customers to build and operate their own software?

Options:

A.  

SaaS

B.  

IaaS

C.  

PaaS

Discussion 0
Questions 81

Which scenario best represents defense in depth?

Options:

A.  

Relying only on a firewall

B.  

Storing all data on one server

C.  

Requiring only a username and password

D.  

None

Discussion 0
Questions 82

What is the recommended temperature range for optimal data center uptime?

Options:

A.  

62°F–69°F

B.  

64°F–81°F

C.  

82°F–90°F

D.  

91°F–100°F

Discussion 0
Questions 83

What is the benefit of subnetting?

Options:

A.  

By increasing network bandwidth

B.  

By improving network security

C.  

By reducing network congestion

D.  

By simplifying network management

Discussion 0
Questions 84

Which of the following is unlikely to be a member of the disaster recovery team?

Options:

A.  

Executive management

B.  

Public relations

C.  

Billing clerk

D.  

IT personnel

Discussion 0
Questions 85

A practitioner needing step-by-step instructions to complete a provisioning task should consult a:

Options:

A.  

Standard

B.  

Policy

C.  

Procedure

D.  

Laws or regulations

Discussion 0
Questions 86

Which principle states that users should have access only to the specific data and resources needed to perform required tasks?

Options:

A.  

Zero Trust

B.  

Defense in Depth

C.  

Least Privilege

D.  

All

Discussion 0
Questions 87

The means by which a threat actor carries out their objectives.

Options:

A.  

Threat

B.  

Threat Vector

C.  

Exploit

D.  

Intrusion

Discussion 0
Questions 88

Which is the most efficient and effective way to test a business continuity plan?

Options:

A.  

Simulations

B.  

Discussions

C.  

Walkthroughs

D.  

Reviews

Discussion 0
Questions 89

In which access control model can the creator of an object delegate permissions?

Options:

A.  

MAC

B.  

RBAC

C.  

ABAC

D.  

DAC

Discussion 0
Questions 90

Which service uses a registered port?

Options:

A.  

HTTP

B.  

SMB

C.  

TCP

D.  

MS SQL Server

Discussion 0
Questions 91

Which protocol would be most suitable to fulfill the secure communication requirements between clients and the server for a company deploying a new application?

Options:

A.  

FTP

B.  

HTTP

C.  

HTTPS

D.  

SMTP

Discussion 0
Questions 92

Walmart has a large e-commerce presence worldwide. Which solution would ensure the LOWEST possible latency for customers using their services?

Options:

A.  

CDN

B.  

SaaS

C.  

Load balancing

D.  

Decentralized data centers

Discussion 0
Questions 93

Which is the first step in the risk management process?

Options:

A.  

Risk response

B.  

Risk mitigation

C.  

Risk identification

D.  

Risk assessment

Discussion 0
Questions 94

Which of the following is NOT one of the three main components of an SQL database?

Options:

A.  

Views

B.  

Schemas

C.  

Tables

D.  

Object-oriented interfaces

Discussion 0
Questions 95

A common network device used to filter traffic?

Options:

A.  

Server

B.  

Endpoint

C.  

Ethernet

D.  

Firewall

Discussion 0
Questions 96

Which one of the following cryptographic algorithms does NOT depend upon the prime factorization problem?

Options:

A.  

RSA – Rivest-Shamir-Adleman

B.  

GPG – GNU Privacy Guard

C.  

ECC – Elliptic Curve Cryptosystem

D.  

PGP – Pretty Good Privacy

Discussion 0
Questions 97

Which device is used to control traffic flow between networks?

Options:

A.  

SDN

B.  

Switch

C.  

Hub

D.  

Router

Discussion 0
Questions 98

What is meant by non-repudiation?

Options:

A.  

If a user does something, they can't later claim that they didn't do it.

B.  

Controls to protect the organization's reputation from harm due to inappropriate social media postings by employees, even if on their private accounts and personal time.

C.  

It is part of the rules set by administrative controls.

D.  

It is a security feature that prevents session replay attacks.

Discussion 0
Questions 99

A backup is which type of security control?

Options:

A.  

Preventive

B.  

Deterrent

C.  

Recovery

D.  

Corrective

Discussion 0
Questions 100

What drove the introduction of IPv6?

Options:

A.  

IPv4 was insecure

B.  

IPv4 was incompatible

C.  

IPv4 address exhaustion

D.  

IPv6 supports Wi-Fi

Discussion 0
Questions 101

Which concept prevents crime by designing a physical environment that positively influences human behavior?

Options:

A.  

DMZ

B.  

Security alarm

C.  

CPTED

D.  

CCTV

Discussion 0
Questions 102

Mark is configuring an automated data transfer between two hosts and needs an authentication method. What approach is best suited?

Options:

A.  

Biometric

B.  

Smart Card

C.  

SSH Key

D.  

Hard-coded Password

Discussion 0
Questions 103

Which of the following is often associated with Disaster Recovery planning?

Options:

A.  

Checklists

B.  

Antivirus

C.  

Firewalls

D.  

All

Discussion 0
Questions 104

When the ISC2 mail server sends mail to other mail servers, it becomes a —?

Options:

A.  

SMTP Server

B.  

SMTP Peer

C.  

SMTP Master

D.  

SMTP Client

Discussion 0
Questions 105

A company’s servers are down due to malware. What is the FIRST step the DR team should take?

Options:

A.  

Disconnect affected systems

B.  

Conduct risk assessment

C.  

Restore from backups

D.  

Contact law enforcement

Discussion 0
Questions 106

The evaluation of security controls to determine whether they are implemented correctly and operating as intended is known as:

Options:

A.  

Security assessment

B.  

Risk assessment

C.  

DRP

D.  

IRP

Discussion 0
Questions 107

An ISC2 member is offered an illicit copy of a movie. What should they do?

Options:

A.  

Inform ISC2

B.  

Inform law enforcement

C.  

Accept the movie

D.  

Refuse to accept

Discussion 0
Questions 108

Hashing safeguards which CIA triad principle?

Options:

A.  

Confidentiality

B.  

Availability

C.  

Integrity

D.  

All

Discussion 0
Questions 109

A system crash results in loss of data. What term best describes this?

Options:

A.  

Breach

B.  

Incident

C.  

Event

D.  

Adverse event

Discussion 0
Questions 110

A logical group of workstations, servers, and network devices that appear to be on the same LAN despite their geographical distribution.

Options:

A.  

LAN

B.  

VPN

C.  

WLAN

D.  

VLAN

Discussion 0
Questions 111

Which provides confidentiality by hiding or obscuring a message so it cannot be understood by unauthorized parties?

Options:

A.  

Hashing

B.  

Encoding

C.  

Cryptography

D.  

All

Discussion 0
Questions 112

What is the primary purpose of a honeytoken in cybersecurity?

Options:

A.  

To lure and detect attackers

B.  

To encrypt sensitive data

C.  

To enhance network performance

D.  

To manage user access

Discussion 0
Questions 113

Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

Options:

A.  

Brute-force attack

B.  

Dictionary attack

C.  

Social engineering attack

D.  

Replay attack

Discussion 0
Questions 114

Communication between end systems is encrypted using a key, often known as ________?

Options:

A.  

Temporary key

B.  

Section key

C.  

Public key

D.  

Session key

Discussion 0
Questions 115

What is a security token used to authenticate a user to a web application, typically after they log in?

Options:

A.  

CAPTCHA

B.  

API key

C.  

CSRF token

D.  

Session token

Discussion 0
Questions 116

Which is NOT a function of an Intrusion Prevention System (IPS)?

Options:

A.  

Encrypt network traffic

B.  

Monitor network traffic

C.  

Filter network traffic

D.  

Detect and prevent attacks

Discussion 0
Questions 117

Which version of TLS is considered the most secure and recommended for use?

Options:

A.  

TLS 1.0

B.  

TLS 1.1

C.  

TLS 1.2

D.  

TLS 1.3

Discussion 0
Questions 118

Exhibit.

IPSec works in which layer of OSI Model

Options:

A.  

Layer 2

B.  

Layer 5

C.  

Layer 3

D.  

Layer 7

Discussion 0
Questions 119

In which cloud model does the customer have theleast responsibilityover infrastructure?

Options:

A.  

FaaS

B.  

SaaS

C.  

IaaS

D.  

PaaS

Discussion 0
Questions 120

A company experiences a major IT outage and cannot perform critical business functions. Which plan helps recovery?

Options:

A.  

BCP

B.  

IRP

C.  

DRP

D.  

BIA

Discussion 0