Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

CC ISC CC - Certified in Cybersecurity Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC CC CC - Certified in Cybersecurity certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 7
Total 407 questions

What are the primary responsibilities of a computer incident response team (CIRT) during an incident?

A.

To determine the difference between minor and major incident

B.

To troubleshoot network and system issues

C.

To provide medical assistance at accident scenes

D.

To asses the amount and scope of damage caused by the incident

Which security control mostly used to prevent data breach

A.

Physical control

B.

Logical Control

C.

Adminstrative Control

D.

RBAC

Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?

A.

Non-repudiation

B.

Integrity

C.

Availability

D.

Confidentiality

What is the first phase in System Development Life Cycle

A.

Requirements Analysis Phase

B.

Feasibilty Study

C.

Design Phase

D.

Development Phase

Which OSI layer VPN works

A.

Layer 5

B.

Layer 6

C.

Layer 1

D.

Layer 3

Security control used to protect against environmental threats such as fire, flood and earth quakes

A.

Physical control

B.

Logical Control

C.

Adminstrative Control

D.

Thechnical control

What is the primary goal of network segmentation in cybersecurity?

A.

To increase network speed

B.

To isolate and protect critical assets

C.

To centralize data storage

D.

To expand the network's coverage

What is sensitivity in the context of confidentiality

A.

The harm caused to externl stakeholders if information is disclosed or modified

B.

The ability of information to be accessed only by authorized individuals

C.

The need for protection assigned to information by its owner

D.

The Health status of the individuals

Devid's team recently implemented a new system that gathers information from a variety of different log sources, analyses that information, and then triggers automated playbooks in response to security events, what term BEST describes this technology?

A.

SIEM

B.

Log Repository

C.

IPS

D.

SOAR

Which of the following best describes the type of technology the team should implement to increase the work effort of buffer overflow attacks?

A.

Address space layout randomization

B.

Memory induction application

C.

Input memory isolation

D.

Read-only memory integrity checks

Which encryption type used in HTTPS communication

A.

Symentric

B.

Assymentric

C.

None

D.

Both A and B

Networks are often micro segmented networks, with firewalls at nearly every connecting point

A.

DMZ

B.

VPN

C.

VLAN

D.

Zero Trust

The highest-level governance documents in an organization, usually approved and issued by management, usually to support a compliance initiative

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or Regulations

Type 1 authentication posses

A.

Users may share their credential with others

B.

User may forgot their passwords

C.

Passwords may be intercepted and stolen

D.

ALL

Which is an approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network.

A.

VLAN

B.

SDN

C.

VPN

D.

SAN

Port used in DNS

A.

53

B.

80

C.

45

D.

54

Which Prevent crime by designing a physical environment that positively influences human behavior.

A.

DMZ

B.

Security Alarm

C.

CPTED

D.

CCTV

What does internal consistency of information refer to

A.

Data being accurate, usefull and complete

B.

Data being protected from errors or loss of information

C.

All instances of data being identical in form content and meaning

D.

Data being displayed and stored the same way on all system

What should been done to limit the damage caused by the ransomware attack

A.

Use a different email client to prevent malicious attachments

B.

Add more Administrative users to the Domain Admins group

C.

Delete all emails with attachments

D.

Limit the use of administrative privileges to only when required

What does the term "Two-factor authentication" refer to in Cybersecurity?

A.

Using two different antivirus programs

B.

Verifying identity with two independent factors

C.

Accessing two different networks simultaneously

D.

Changing passwords every two weeks

Page: 2 / 7
Total 407 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved