Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

CC ISC CC - Certified in Cybersecurity Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC CC CC - Certified in Cybersecurity certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 7
Total 407 questions

A scammer will attempt to make a malicious website look exactly like a legitimate one that the victim knows and trusts

A.

DOS

B.

Virus

C.

Spoofing

D.

Phishing

What is the process of verifying a users identity called?

A.

Confidentiality

B.

Autentication

C.

Authorization

D.

Identification

Which one of the following controls is not particularly effective against the insider threat?

A.

Least privilege

B.

Background checks

C.

Firewalls

D.

Separation of duties

The Bell and LaPadula access control model is a form of

A.

RBAC

B.

MAC

C.

DAC

D.

ABAC

Communication between end systems is encrypted using a key, often known as________?

A.

Temporary Key

B.

Section Key

C.

Public Key

D.

Session Key

A security practitioner who needs step-by-step instructions to complete a provisioning task

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or Regulations

A Hacker launched a specific attack to exploit a known system vulnerability. What term best describes this situation?

A.

Breach

B.

Event

C.

Exploit

D.

Intrusion

Which of these tool is commonly used to crack passwords

A.

Bup Suite

B.

Nslookup

C.

Wireshark

D.

John the ripper

The last phase in the data security cycle is

A.

Encryption

B.

Destruction

C.

Archival

D.

Backup

The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.)

A.

DDOS

B.

Authetication

C.

Authentication

D.

Availablity

In information systems terms, the activities necessary to restore IT and communications services of an organization during and after an outage

A.

IR

B.

BC

C.

Risk Management

D.

DR

A Company IT system experienced a system crash that result in a loss of data. What term best describes this event?

A.

Breach

B.

Incident

C.

Event

D.

Adverse Event

Example of Deterrent controls

A.

CCTV

B.

BCP

C.

DRP

D.

IRP

What is the purpose of defense in depth in information security

A.

To Implement only technical controls to prevent a cyber attack

B.

To provide unrestricted access to organization assets

C.

To establish variable barriers across multiple layers and mission of the organization

D.

To guarantee that a cyber attack will not occur

What security feature used in HTTPS

A.

IPSec

B.

SSH

C.

ICMP

D.

SSL/TLS

The common term used to describe the mechanisms that control the temperature and humidity in a data center

A.

VLAN (virtual local area network)

B.

STAT (system temperature and timing)

C.

TAWC (temperature and water control)

D.

HVAC (heating, ventilation and air conditioning)

A portion of the organization's network that interfaces directly with the outside world; typically, this exposed area has more security controls and restrictions than the rest of the internal IT environment.

A.

Virtual private network (VPN)

B.

Virtual local area network (VLAN)

C.

Zero Trust

D.

Demilitarized zone (DMZ)

Which of the following physical controls is used to protect against eavesdropping and data theft through electromagnetic radiation

A.

EMI Shielding

B.

Screening rooms

C.

White noise generators

D.

ALL

What goal of security is enhanced by a strong business continuity program?

A.

non-repudiation

B.

Availability

C.

Confidentiality

D.

Integrity

The process of running a simulated instances of a computer system in a layer abstracted from the underlying hardware server or workstation

A.

Containerization

B.

Simulation

C.

Emulation

D.

Virtualization

Page: 4 / 7
Total 407 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved