Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

CC ISC CC - Certified in Cybersecurity Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC CC CC - Certified in Cybersecurity certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 7
Total 407 questions

What does Criticality represents?

A.

The need for consultation with the involved business ensure critical systems are identified and available

B.

The importance an organization gives to data or an information system in performing its operations or achieving its mission

C.

The need for security professional to ensure the appropriate levels of availavility are provided

D.

All of the above

Methods or mechanisms cybercriminals use to gain illegal, unauthorized access to computer systems and networks.

A.

Attacker

B.

Threat Vector

C.

Threat

D.

Threat actor

_______are virtual separations within a switch and are used mainly to limit broadcast traffic

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Granting a user access to services or the system

A.

Authentication

B.

Identification

C.

Authorization

D.

Confidentiality

An IP network protocol standardized by the Internet Engineering Task Force (IETF) through RFC 792 to determine if a particular service or host is available.

A.

IP

B.

ICMP

C.

IGMP

D.

HTTP

How does IPSec protect against reply attacks

A.

By using sequence numbers

B.

By limiting access to the network

C.

By using digital signatures

D.

By encryption all network traffic

Configuration settings or parameters stored as data, managed through a software graphical user interface (GUI) is

A.

Logical access control

B.

Physical access control

C.

Administratirve Access control

An agreement between a cloud service provider and a cloud service customer based on a taxonomy of cloud computing- specific terms

A.

Memorandum of Understanding

B.

Memorandam on Agreement

C.

SLA

D.

AII

Which type of application can intercept sensitive information such as passwords on a network segment?

A.

Log server

B.

Network Scanner

C.

Firewall

D.

Protocol Analyzer

Example of Token based Authentication

A.

Kerberos

B.

Basic

C.

OAuth

D.

NTLN

Selvaa presents a userid and a password to a system in order to log on. Which of the following characteristics must the userid have?

A.

Autherization

B.

Authentication

C.

Availability

D.

Identification

Also known as a virtual machine monitor or VMM, is software that creates and runs virtual machines (VMs)

A.

Hypervisor

B.

Simulation

C.

Emulation

D.

Cloud Controller

What is the purpose of the CIA triad terms

A.

To make security more understable to management and users

B.

To describe security using relevant and meaningful words

C.

To define the purpose of security

D.

AII

What is the primary purpose of a honeytoken in cybersecurity?

A.

To lure and detect attackers

B.

To encrypt sensitive data

C.

To enhance network performance

D.

To manage user access

A company experiences a power outage that causes a major disruption in its operations. What type of plan will help the company sustain operations?

A.

DRP

B.

IRP

C.

BCP

D.

ALL

What is the main purpose of creating baseline in ensuring system integrity

A.

To compare the baseline with the current state of the systems

B.

To protect the information

C.

To understand the current state of the system

D.

AII

Which maintains that a user or entity should only have access to the spec data, resources and applications needed to complete a required task.

A.

Zero Trust

B.

Defence in Depth

C.

Least Privileges

D.

AII

Dani is an ISC2 member and an employee of New Corporation. One of Dani's colleagues offers to share a file that contains an illicit copy of a newly released movie. What should Dani do

A.

Inform ISC2

B.

Inform law enforcement

C.

Accept the movie

D.

Refuse to accept

Why is an asset inventory much important?

A.

It tells you what to encrypt

B.

The law requires it

C.

It contains a price list

D.

You can't protect what you don't know you have

What does the concept of integrity applied to

A.

Organization

B.

Information system and processes for business operations

C.

People

D.

ALL

Page: 3 / 7
Total 407 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved