Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CC ISC CC - Certified in Cybersecurity Free Practice Exam Questions (2026 Updated)

Prepare effectively for your ISC CC CC - Certified in Cybersecurity certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 6
Total 403 questions

Software that creates and manages virtual machines (VMM) is called:

A.

Hypervisor

B.

Simulation

C.

Emulation

D.

Cloud controller

What is the difference between BCP and DRP?

A.

BCP restores IT; DRP maintains business functions

B.

DRP restores IT; BCP maintains business functions

C.

They are the same

D.

BCP is only before disasters

Port used by DNS.

A.

53

B.

80

C.

45

D.

54

Configuration settings or parameters stored as data and managed through a GUI are examples of:

A.

Logical access control

B.

Physical access control

C.

Administrative access control

Which attack attempts to gain information by observing a device’s power consumption?

A.

DoS

B.

Side-channel attack

C.

XSS

D.

CSRF

What is the range of private (dynamic/ephemeral) ports?

A.

0 – 1023

B.

1023 – 49151

C.

49152 – 65535

D.

None

Which fire suppression system is more friendly to electronics?

A.

Carbon dioxide–based

B.

Chemical-based

C.

Water-based

D.

Foam-based

VLAN hopping belongs to which OSI layer?

A.

Layer 3

B.

Layer 4

C.

Layer 7

D.

Layer 2

Which OSI layer does a VPN primarily operate at?

A.

Layer 5

B.

Layer 6

C.

Layer 1

D.

Layer 3

An employee unintentionally shares confidential information with an unauthorized party. What term best describes this?

A.

Event

B.

Exploit

C.

Intrusion

D.

Breach

The magnitude of harm expected from unauthorized disclosure, modification, destruction, or loss of information is known as:

A.

Threat

B.

Vulnerability

C.

Impact

D.

Likelihood

The method of distributing network traffic equally across a pool of resources is called:

A.

VLAN

B.

DNS

C.

VPN

D.

Load balancing

An entity that exploits system vulnerabilities is known as a:

A.

Attacker

B.

Threat vector

C.

Threat

D.

Threat actor

What is the highest priority during incident response?

A.

Protect mission

B.

Reduce impact

C.

Protect life, health, and safety

D.

Resume operations

Critical business functions are disrupted due to a system outage. Which plan sustains operations?

A.

DRP

B.

BCP

C.

IRP

D.

All

Which of the following protocols is a secure alternative to using Telnet?

A.

SSH

B.

HTTPS

C.

SFTP

D.

LDAPS

Which type of attack takes advantage of vulnerabilities in validation?

A.

ARP spoofing

B.

Pharming attacks

C.

Cross-site scripting (XSS)

D.

DNS poisoning

What is the term used to denote the inherent set of privileges assigned to a user upon the creation of a new account?

A.

Aggregation

B.

Transitivity

C.

Baseline

D.

Entitlement

What is the primary goal of a risk management process in cybersecurity?

A.

Eliminate all risks

B.

Transfer all risks

C.

Identify, assess, and mitigate risks to an acceptable level

D.

Ignore risks

The concept of integrity applies to:

A.

Organization

B.

Information systems and business processes

C.

People

D.

All

Page: 2 / 6
Total 403 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved