Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CC ISC CC - Certified in Cybersecurity Free Practice Exam Questions (2026 Updated)

Prepare effectively for your ISC CC CC - Certified in Cybersecurity certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 6
Total 403 questions

When is the Business Continuity Plan (BCP) enacted?

A.

When there is an event

B.

When there is an incident

C.

When there is a loss of business operations

D.

When there is a natural disaster

True or False: The IT department is responsible for creating the organization’s Business Continuity Plan.

A.

True

B.

False

What does a breach refer to in the context of cybersecurity?

A.

An unauthorized access to a system or system resource

B.

Any observable occurrence in a network or system

C.

A deliberate security incident

D.

A previously known system vulnerability

The right of an individual to control the distribution of information about themselves is:

A.

Confidentiality

B.

Integrity

C.

Privacy

D.

Availability

Access control used in high-security military and government environments:

A.

DAC

B.

MAC

C.

RBAC

D.

ABAC

Which type of application can intercept sensitive information such as passwords on a network segment?

A.

Log server

B.

Network scanner

C.

Firewall

D.

Protocol analyzer

Uses multiple types of access controls in layered fashion to avoid monolithic security:

A.

DMZ

B.

VLAN

C.

Defense in Depth

D.

VPN

What is the process of verifying a user’s identity called?

A.

Confidentiality

B.

Authentication

C.

Authorization

D.

Identification

A company experiences a major IT outage and cannot perform critical business functions. Which plan helps recovery?

A.

BCP

B.

IRP

C.

DRP

D.

BIA

A set of security controls or system settings used to ensure uniformity of configuration through the IT environment?

A.

Patches

B.

Inventory

C.

Baseline

D.

Policy

An attacker places themselves between two communicating devices is known as:

A.

Phishing

B.

Spoofing

C.

On-Path attack

D.

All

Which of the following attacks can TLS help mitigate?

A.

Cross-site Scripting (XSS) attacks

B.

Social engineering attacks

C.

Man-in-the-middle (MITM) attacks

D.

SQL injection attacks

Example of dynamic authorization:

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

Derrick logs on to a system in order to read a file. In this example, Derrick is the ______?

A.

Subject

B.

Object

C.

Process

D.

Predicate

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which control would BEST achieve his objective?

A.

URL Filter

B.

IP Address Block

C.

DLP Solution

D.

IPS Solution

What type of attack does the attacker store and reuse login information? Select the BEST answer.

A.

Man-in-the-middle attack

B.

Smurf attack

C.

DDoS attack

D.

Replay attack

Example of a deterrent control:

A.

CCTV

B.

BCP

C.

DRP

D.

IRP

Ping flood attacks target which OSI layer?

A.

Layer 4

B.

Layer 3

C.

Layer 5

D.

Layer 6

What is an incident in cybersecurity?

A.

Any event

B.

Unauthorized access

C.

An exploit

D.

An event that jeopardizes CIA

Why is identifying roles and responsibilities important in IR planning?

A.

To prevent incidents

B.

To ensure everyone knows their role

C.

To reduce impact

D.

To select containment strategy

Page: 4 / 6
Total 403 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved