Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CC ISC CC - Certified in Cybersecurity Free Practice Exam Questions (2026 Updated)

Prepare effectively for your ISC CC CC - Certified in Cybersecurity certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 6
Total 403 questions

Malware that disguises itself as legitimate software is called:

A.

Worm

B.

Trojan

C.

Virus

D.

Ransomware

Which access control model is best suited for a large organization with many departments and varied access needs?

A.

DAC

B.

RBAC

C.

MAC

D.

RuBAC

A company’s governing board decides that only legal services may review third-party contracts. They create a document stating that no other department has permission to do so. This document is a:

A.

Procedure

B.

Policy

C.

Standard

D.

Law

Which control identifies that an attack has occurred or is occurring?

A.

Preventive control

B.

Detective control

C.

Corrective control

D.

Recovery control

Which version of TLS is considered the most secure and recommended for use?

A.

TLS 1.0

B.

TLS 1.1

C.

TLS 1.2

D.

TLS 1.3

Which port is used by SSH?

A.

21

B.

23

C.

24

D.

22

The mitigation of violations of security policies and recommended practices is known as:

A.

Disaster recovery

B.

Incident response

C.

Threat hunting

D.

Incident response

If a device is found to be non-compliant with the security baseline, what action should the security team take?

A.

Report

B.

Evaluate

C.

Ignore

D.

Disable or isolate it into a quarantine area until it can be checked and updated

Which allows extremely granular restrictions down to individual machines or users?

A.

DMZ

B.

Microsegmentation

C.

VLAN

D.

NAC

Which of the following is NOT one of the three main components of an SQL database?

A.

Views

B.

Schemas

C.

Tables

D.

Object-oriented interfaces

Which access control method uses attributes and rules evaluated by a central Policy Decision Point (PDP)?

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

What is an IP address?

A.

A physical address

B.

A vendor identifier

C.

A logical address associated with a network interface

D.

A hardware address

A company wants to prevent employees from bringing unauthorized electronic devices into the workspace. Which physical control is best?

A.

Metal detectors

B.

Security guards

C.

RFID scanners

D.

Baggage X-ray machines

Difference between sniffing and spoofing:

A.

Sniffing intercepts traffic; spoofing disguises identity

B.

Snooping intercepts traffic; sniffing disguises identity

C.

Both are the same

D.

Sniffing is not a threat

Mark is configuring an automated data transfer between two hosts and needs an authentication method. What approach is best suited?

A.

Biometric

B.

Smart Card

C.

SSH Key

D.

Hard-coded Password

Which is a component of a Business Continuity (BC) plan?

A.

Immediate response procedures

B.

Notification systems and call trees

C.

Management authority guidance

D.

All

Which IR phase involves identifying critical data and systems?

A.

Detection and analysis

B.

Preparation

C.

Containment

D.

Eradication

A standard that defines wired communication for network devices:

A.

Switch

B.

Hub

C.

Router

D.

Ethernet

A structured way to align IT with business goals while managing risk and regulations:

A.

GRC

B.

Policies

C.

Law

D.

Standard

A company network experiences a sudden flood of network packets that causes major slowdown in Internet traffic. What type of event is this?

A.

Security incident

B.

Natural disaster

C.

Exploit

D.

Adverse event

Page: 3 / 6
Total 403 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved