nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #522

CERTIFIED-IN-CYBERSECURITY Question #522: Real Exam Question with Answer & Explanation

The correct answer is B: Protect society, provide competent service, act ethically. The ISC2 Code of Ethics Canon is a set of professional ethics statements that guide the behavior of cybersecurity professionals (see ISC2 Study Guide, Chapter 1, Module 5). It contains four canons, but the three mentioned in this option are: Protect society (Canon 1), Provide dil

Security Principles

Question

What three intents are found in the ISC2 Code of Ethics?

Options

  • AProtect society, resolve vulnerabilities, and act ethically
  • BProtect society, provide competent service, act ethically
  • CProtect society, detect vulnerabilities, and act ethically
  • DProtect society, report, vulnerabilities, provide competent service

Explanation

The ISC2 Code of Ethics Canon is a set of professional ethics statements that guide the behavior of cybersecurity professionals (see ISC2 Study Guide, Chapter 1, Module 5). It contains four canons, but the three mentioned in this option are: Protect society (Canon 1), Provide diligent and competent service to clients (Canon 3), and Advance and protect the profession (Canon 4), which includes acting ethically. While the other options contain elements of the ISC2 Code of Ethics Canon, they do not accurately represent the three intents. Detecting and remediating vulnerabilities are important responsibilities of a cybersecurity professional, but they are not explicitly mandated in the ISC2 Code of Ethics Canon. Reporting vulnerabilities is part of Canon 2: Act Honorably, Honestly, Justly, Responsibly, and Legally, but it is not a separate mandate in the ISC2 Code of Ethics Canon. Instead, these actions can be viewed as part of the broader mandate to protect society and provide competent service.

Topics

#(ISC)2 Code of Ethics#Professional Ethics#Ethical Conduct#Cybersecurity Principles

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions