Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ISC > ISC certification > CC

CC CC - Certified in Cybersecurity Question and Answers

Question # 4

Who should participate in creating a BCP?

A.

IT only

B.

Management only

C.

Members across the organization

D.

Finance only

Full Access
Question # 5

Exhibit.

What is the purpose of a Security Information and Event Management (SIEM) system?

A.

Encrypting files

B.

Monitoring and analyzing security events -

C.

Blocking malicious websites

D.

Managing user passwords

Full Access
Question # 6

Removing the belief that a network has any trusted space and enforcing security at the most granular level is known as:

A.

Zero Trust

B.

Defense in Depth

C.

Least Privilege

D.

All

Full Access
Question # 7

Which principle requires that all instances of data be identical?

A.

Confidentiality

B.

Availability

C.

Consistency

D.

All

Full Access
Question # 8

Which of the following properties is NOT guaranteed by digital signatures?

A.

Authentication

B.

Confidentiality

C.

Non-repudiation

D.

Integrity

Full Access
Question # 9

What is the recommended temperature range for optimal data center uptime?

A.

62°F–69°F

B.

64°F–81°F

C.

82°F–90°F

D.

91°F–100°F

Full Access
Question # 10

Which security control is most commonly used to prevent data breaches?

A.

Physical control

B.

Logical control

C.

Administrative control

D.

RBAC

Full Access
Question # 11

Which of the following is NOT one of the three main components of an SQL database?

A.

Views

B.

Schemas

C.

Tables

D.

Object-oriented interfaces

Full Access
Question # 12

A scam where a malicious website is made to look exactly like a trusted site is called:

A.

DoS

B.

Virus

C.

Spoofing

D.

Phishing

Full Access
Question # 13

The harmonization of automated computing tasks into reusable workflows is called:

A.

Cloud orchestration

B.

Cloud manager

C.

Cloud broker

D.

Cloud controller

Full Access
Question # 14

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which control would BEST achieve his objective?

A.

URL Filter

B.

IP Address Block

C.

DLP Solution

D.

IPS Solution

Full Access
Question # 15

The last phase in the data security lifecycle is:

A.

Encryption

B.

Destruction

C.

Archival

D.

Backup

Full Access
Question # 16

Incident management is also known as:

A.

Risk management

B.

Business continuity management

C.

Incident management

D.

Crisis management

Full Access
Question # 17

What is the potential impact of an IPSec replay attack?

A.

Modification of network traffic

B.

Disruption of network communication

C.

Unauthorized access to network resources

D.

All

Full Access
Question # 18

According to ISC2 Code of Ethics, to whom does Kristal ultimately report?

A.

The company

B.

Governments

C.

ISC2

D.

The users

Full Access
Question # 19

What is the most important aspect of security awareness and training?

A.

Maximizing business capabilities

B.

Protecting assets

C.

Protecting health and human safety

D.

Ensuring confidentiality of data

Full Access
Question # 20

Malware that disguises itself as legitimate software is called:

A.

Worm

B.

Trojan

C.

Virus

D.

Ransomware

Full Access
Question # 21

What is the primary goal of network segmentation in cybersecurity?

A.

To increase network speed

B.

To isolate and protect critical assets

C.

To centralize data storage

D.

To expand network coverage

Full Access
Question # 22

Why is a “Red Book” important in Business Continuity Planning?

A.

To have a hard copy for easy access

B.

Easy to carry and transfer

C.

When disasters disable power and electronic access

D.

All

Full Access
Question # 23

A system crash results in loss of data. What term best describes this?

A.

Breach

B.

Incident

C.

Event

D.

Adverse event

Full Access
Question # 24

Which is NOT a component of a Business Continuity (BC) plan?

A.

Immediate response procedures

B.

Notification systems

C.

Management authority guidance

D.

Management

Full Access
Question # 25

Which is NOT a function of an Intrusion Prevention System (IPS)?

A.

Encrypt network traffic

B.

Monitor network traffic

C.

Filter network traffic

D.

Detect and prevent attacks

Full Access
Question # 26

A measure of the degree to which an organization depends on information or systems to achieve its mission is called:

A.

Availability

B.

Criticality

C.

Authorization

D.

Confidentiality

Full Access
Question # 27

Mark has purchased a Mac laptop. He is scared of losing his screen and is planning to buy an insurance policy. Which risk management strategy is this?

A.

Risk acceptance

B.

Risk deterrence

C.

Risk transference

D.

Risk mitigation

Full Access
Question # 28

A device that forwards traffic to the port of a known destination device is a:

A.

Switch

B.

Hub

C.

Router

D.

Ethernet

Full Access
Question # 29

Selvaa presents a user ID and password to log on. Which characteristic must the user ID have?

A.

Authorization

B.

Authentication

C.

Availability

D.

Identification

Full Access
Question # 30

Configuration settings or parameters stored as data and managed through a software graphical user interface (GUI) are examples of:

A.

Logical access control

B.

Physical access control

C.

Administrative access control

Full Access
Question # 31

A DDoS attack flooding ICMP packets is called:

A.

DoS

B.

SYN flood

C.

Smurf attack

D.

Phishing

Full Access
Question # 32

The documented set of procedures to detect, respond to, and limit the consequences of cyberattacks is called:

A.

IR

B.

IRP

C.

BCP

D.

DRP

Full Access
Question # 33

Which zero-trust component breaks LANs into very small, localized security zones?

A.

Zero Trust

B.

DMZ

C.

VPN

D.

Microsegmentation

Full Access
Question # 34

Which uses encrypted, machine-generated codes to verify a user's identity?

A.

Basic authentication

B.

Form-based authentication

C.

Token-based authentication

D.

All

Full Access
Question # 35

Events with negative consequences such as crashes, floods, defacement, or malicious code execution are called:

A.

Breach

B.

Incident

C.

Adverse event

D.

Exploit

Full Access
Question # 36

In which cloud model does the customer have theleast responsibilityover infrastructure?

A.

FaaS

B.

SaaS

C.

IaaS

D.

PaaS

Full Access
Question # 37

A company wants to prevent employees from bringing unauthorized electronic devices into the workspace. Which physical control is best?

A.

Metal detectors

B.

Security guards

C.

RFID scanners

D.

Baggage X-ray machines

Full Access
Question # 38

In which access control model can the creator of an object delegate permissions?

A.

MAC

B.

RBAC

C.

ABAC

D.

DAC

Full Access
Question # 39

Which service uses a registered port?

A.

HTTP

B.

SMB

C.

TCP

D.

MS SQL Server

Full Access
Question # 40

A common network device used to filter traffic?

A.

Server

B.

Endpoint

C.

Ethernet

D.

Firewall

Full Access
Question # 41

Token Ring operates at which OSI layer?

A.

Application

B.

Network

C.

Transport

D.

Physical

Full Access
Question # 42

Which type of network is set up similar to the internet but is private to an organization? Select the MOST appropriate answer.

A.

Extranet

B.

VLAN

C.

Intranet

D.

VPN

Full Access
Question # 43

The highest-level governance documents approved by management are:

A.

Standards

B.

Policies

C.

Procedures

D.

Laws or regulations

Full Access
Question # 44

Which prevents threats?

A.

Antivirus

B.

IDS

C.

SIEM

D.

HIDS

Full Access
Question # 45

Protection against an individual falsely denying having performed a particular action.

A.

Authentication

B.

Identification

C.

Verification

D.

Non-repudiation

Full Access
Question # 46

An IP network protocol standardized by the IETF through RFC 792 to determine if a host is available is:

A.

IP

B.

ICMP

C.

IGMP

D.

HTTP

Full Access
Question # 47

What is knowledge-based authentication?

A.

Authentication based on a passphrase or secret code

B.

Authentication based on a token or smart card

C.

Authentication based on biometrics

D.

Authentication based on behavior

Full Access
Question # 48

Access control used in high-security military and government environments:

A.

DAC

B.

MAC

C.

RBAC

D.

ABAC

Full Access
Question # 49

In DAC, a subject granted access can:

A.

Change security attributes

B.

Choose attributes for new objects

C.

Change access rules

D.

All

Full Access
Question # 50

Why is identifying roles and responsibilities important in IR planning?

A.

To prevent incidents

B.

To ensure everyone knows their role

C.

To reduce impact

D.

To select containment strategy

Full Access
Question # 51

Which scenario best represents defense in depth?

A.

Relying only on a firewall

B.

Storing all data on one server

C.

Requiring only a username and password

D.

None

Full Access
Question # 52

Which document serves as specifications for implementing policy and dictates mandatory requirements?

A.

Policy

B.

Guideline

C.

Standard

D.

Procedure

Full Access
Question # 53

Which technology should be implemented to increase the work effort required for buffer overflow attacks?

A.

Address Space Layout Randomization

B.

Memory induction application

C.

Input memory isolation

D.

Read-only memory integrity checks

Full Access
Question # 54

A company analyzes system requirements, functions, and interdependencies to prioritize contingency needs. What is this process called?

A.

BCP

B.

DRP

C.

IRP

D.

BIA

Full Access
Question # 55

Which is the loopback address?

A.

::1

B.

127.0.0.1

C.

255.255.255.0

D.

Both A and B

Full Access
Question # 56

Which OSI layer associates MAC addresses with network devices?

A.

Physical layer

B.

Network layer

C.

Data Link layer

D.

Transport layer

Full Access
Question # 57

Which physical controls protect against electromagnetic eavesdropping?

A.

EMI shielding

B.

Screening rooms

C.

White noise generators

D.

All

Full Access
Question # 58

What does the term “Two-factor authentication” refer to in cybersecurity?

A.

Using two different antivirus programs

B.

Verifying identity with two independent factors

C.

Accessing two different networks simultaneously

D.

Changing passwords every two weeks

Full Access
Question # 59

Natalia wants to ensure the authenticity of her organization’s domain name records using digital signatures. What technology should she use?

A.

DNSSIGN

B.

DNSSEC

C.

CERTDNS

D.

DNS2

Full Access
Question # 60

A security event does not affect confidentiality, integrity, or availability. What is it?

A.

Exploit

B.

Breach

C.

Incident

D.

Event

Full Access
Question # 61

Which of the following is NOT a feature of a cryptographic hash function?

A.

Deterministic

B.

Unique

C.

Useful

D.

Reversible

Full Access
Question # 62

An employee launched a privilege escalation attack to gain root access on one of the organization’s database servers. The employee has an authorized user account on the server. What log file would MOST likely contain relevant information?

A.

Database application log

B.

Firewall log

C.

Operating system log

D.

IDS log

Full Access
Question # 63

Malicious code that acts like a remotely controlled “robot” for an attacker.

A.

Rootkit

B.

Malware

C.

Bot

D.

Virus

Full Access
Question # 64

What is the purpose of multi-factor authentication (MFA) in IAM?

A.

To simplify user access

B.

To eliminate the need for authentication

C.

To add an additional layer of security by requiring multiple forms of verification

D.

To grant unrestricted access to all users

Full Access
Question # 65

COVID-19 is an example where which plan sustains business?

A.

IRP

B.

DRP

C.

BCP

D.

All

Full Access
Question # 66

Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?

A.

Non-repudiation

B.

Integrity

C.

Availability

D.

Confidentiality

Full Access
Question # 67

What does a breach refer to in the context of cybersecurity?

A.

An unauthorized access to a system or system resource

B.

Any observable occurrence in a network or system

C.

A deliberate security incident

D.

A previously known system vulnerability

Full Access
Question # 68

A one-way spinning door or barrier that allows only one person at a time to enter a building or area.

A.

Turnstile

B.

Mantrap

C.

Bollard

D.

Gate

Full Access
Question # 69

What is the range of well-known ports?

A.

0–1023

B.

1024–49151

C.

49152–65535

D.

None

Full Access
Question # 70

What is the primary purpose of a firewall?

A.

Encrypt data transmissions

B.

Prevent unauthorized access

C.

Monitor network traffic

D.

Backup critical data

Full Access
Question # 71

Which approach involves a continuous cycle of identifying, assessing, prioritizing, and mitigating cybersecurity risks?

A.

Security assessment

B.

Incident response

C.

Penetration testing

D.

Risk management

Full Access
Question # 72

The common term for systems that control temperature and humidity in a data center is:

A.

VLAN

B.

STAT

C.

TAWC

D.

HVAC

Full Access
Question # 73

A hacker gains unauthorized access and steals confidential data. What term best describes this?

A.

Event

B.

Breach

C.

Intrusion

D.

Exploit

Full Access
Question # 74

A type of malware capable of self-propagation and infecting multiple systems without human intervention is called:

A.

Worm

B.

Spyware

C.

Adware

D.

Virus

Full Access
Question # 75

In which phase of an incident response plan are incidents prioritized?

A.

Post-incident activity

B.

Containment, eradication, and recovery

C.

Detection and analysis

D.

Preparation

Full Access
Question # 76

What is the shortened form of

2001:0db8:0000:0000:0000:ffff:0000:0001?

A.

2001:db8::ffff:0:1

B.

2001:db8:0000:ffff:0:1

C.

2001:db80::ffff:0000:1

D.

2001:db8::ffff:0000:0001

Full Access
Question # 77

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which control would BEST achieve this objective?

A.

URL filter

B.

IP address block

C.

DLP solution

D.

IPS solution

Full Access
Question # 78

Which type of database combines related records and fields into a logical tree structure?

A.

Relational

B.

Hierarchical

C.

Object-oriented

D.

Network

Full Access
Question # 79

An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant is known as:

A.

Eavesdropping attack

B.

CSRF

C.

XSS

D.

ARP spoofing

Full Access
Question # 80

Often offered by third-party organizations and covering advisory or compliance objectives:

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or Regulations

Full Access
Question # 81

Which access control model can grant access to a given object based on complex rules?

A.

ABAC

B.

DAC

C.

MAC

D.

RBAC

Full Access
Question # 82

Scans networks to determine connected devices and services:

A.

Burp Suite

B.

Wireshark

C.

Fiddler

D.

Zenmap

Full Access
Question # 83

What is the primary goal of input validation?

A.

Secure storage

B.

Prevent unauthorized access

C.

Prevent code injection attacks

D.

Encrypt data

Full Access
Question # 84

An agreement between a cloud service provider and a customer based on cloud-specific terms is called:

A.

Memorandum of Understanding

B.

Memorandum of Agreement

C.

Service Level Agreement (SLA)

D.

All

Full Access
Question # 85

Who is responsible for publishing and signing the organization’s policies?

A.

The security office

B.

Human resources

C.

Senior management

D.

The legal department

Full Access
Question # 86

Configuration settings or parameters stored as data and managed through a GUI are examples of:

A.

Logical access control

B.

Physical access control

C.

Administrative access control

Full Access
Question # 87

What is the primary goal of incident management?

A.

To protect life, health, and safety

B.

To reduce the impact of an incident

C.

To prepare for any incident

D.

To resume interrupted operations as soon as possible

Full Access
Question # 88

An employee unintentionally shares confidential information with an unauthorized party. What term best describes this?

A.

Event

B.

Exploit

C.

Intrusion

D.

Breach

Full Access
Question # 89

An external entity has tried to gain access to your organization’s IT environment without authorization. This is an example of a(n):

A.

Exploit

B.

Intrusion

C.

Event

D.

Malware

Full Access
Question # 90

What is the focus of disaster recovery planning after a data center outage?

A.

Maintaining business functions

B.

Fixing hardware

C.

Restoring IT and communications

D.

Emergency response guidance

Full Access
Question # 91

Which document identifies the principles and rules governing an organization’s protection of information systems and data?

A.

Procedure

B.

Guideline

C.

Policy

D.

Standard

Full Access
Question # 92

A tool used to inspect outbound traffic to reduce threats:

A.

Anti-malware

B.

NIDS

C.

DLP

D.

Firewall

Full Access
Question # 93

Which threat is directly associated with malware?

A.

APT

B.

Ransomware

C.

Trojan

D.

DDoS

Full Access
Question # 94

An outward-facing IP address used to access the Internet is a:

A.

Global address

B.

Private address

C.

Public address

D.

DNS

Full Access
Question # 95

To avoid bodily injury claims, a company decides not to offer high-risk services. This is an example of:

A.

Risk Acceptance

B.

Risk Assessment

C.

Risk Avoidance

D.

Risk Control

Full Access
Question # 96

Which type of control minimizes the impact of an attack and restores normal operations as quickly as possible?

A.

Compensatory control

B.

Corrective control

C.

Recovery control

D.

Detective control

Full Access
Question # 97

Which is the first step in the risk management process?

A.

Risk response

B.

Risk mitigation

C.

Risk identification

D.

Risk assessment

Full Access
Question # 98

Granting a user access to services or a system is known as:

A.

Authentication

B.

Identification

C.

Authorization

D.

Confidentiality

Full Access
Question # 99

What is the primary factor in the reliability of information and systems?

A.

Authenticity

B.

Confidentiality

C.

Integrity

D.

Availability

Full Access
Question # 100

If a device is found to be non-compliant with the security baseline, what action should the security team take?

A.

Report

B.

Evaluate

C.

Ignore

D.

Disable or isolate it into a quarantine area until it can be checked and updated

Full Access
Question # 101

What is the main purpose of digital signatures?

A.

Encrypt data

B.

Verify sender identity and ensure message integrity

C.

Prevent network access

D.

Compress data

Full Access
Question # 102

A structured way to align IT with business goals while managing risk and regulations:

A.

GRC

B.

Policies

C.

Law

D.

Standard

Full Access
Question # 103

An ISC2 member is offered an illicit copy of a movie. What should they do?

A.

Inform ISC2

B.

Inform law enforcement

C.

Accept the movie

D.

Refuse to accept

Full Access
Question # 104

Which access control method uses attributes and rules evaluated by a central Policy Decision Point (PDP)?

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

Full Access
Question # 105

Which access control model is best suited for a large organization with many departments and varied access needs?

A.

DAC

B.

RBAC

C.

MAC

D.

RuBAC

Full Access
Question # 106

A DDoS attack affects which OSI layers?

A.

Network layer

B.

Transport layer

C.

Physical layer

D.

Both A and B

Full Access
Question # 107

A standard that defines wired communication for network devices:

A.

Switch

B.

Hub

C.

Router

D.

Ethernet

Full Access
Question # 108

What security feature is used in HTTPS?

A.

IPSec

B.

SSH

C.

ICMP

D.

SSL/TLS

Full Access
Question # 109

The evaluation of security controls to determine whether they are implemented correctly and operating as intended is known as:

A.

Security assessment

B.

Risk assessment

C.

DRP

D.

IRP

Full Access
Question # 110

An external entity attempts unauthorized access to your IT environment. This is a(n):

A.

Exploit

B.

Intrusion

C.

Event

D.

Malware

Full Access
Question # 111

What is an incident in cybersecurity?

A.

Any event

B.

Unauthorized access

C.

An exploit

D.

An event that jeopardizes CIA

Full Access
Question # 112

Which layer provides services directly to the user?

A.

Application Layer

B.

Session Layer

C.

Presentation Layer

D.

Physical Layer

Full Access
Question # 113

Which works by encapsulating one packet inside another?

A.

Network segmentation

B.

Load balancing

C.

Tunneling

D.

Data encryption

Full Access
Question # 114

An analysis of system requirements and interdependencies used to prioritize recovery is known as:

A.

BIA

B.

DR

C.

BCP

D.

IRP

Full Access
Question # 115

Which of the following is an endpoint?

A.

Router

B.

Firewall

C.

Laptop

D.

Switch

Full Access
Question # 116

Which OSI layer does a VPN primarily operate at?

A.

Layer 5

B.

Layer 6

C.

Layer 1

D.

Layer 3

Full Access
Question # 117

Are events that may indicate that an organization's systems or data have been compromised or that protective measures have failed.

A.

Exploit

B.

Security incident

C.

Threat

D.

Breach

Full Access
Question # 118

A backup is which type of security control?

A.

Preventive

B.

Deterrent

C.

Recovery

D.

Corrective

Full Access
Question # 119

What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?

A.

Least privilege

B.

Two-person control

C.

Job rotation

D.

Separation of privileges

Full Access
Question # 120

Which is an example of a deterrent control?

A.

Biometric

B.

Guard dog

C.

Encryption

D.

Turnstile

Full Access