Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CC ISC CC - Certified in Cybersecurity Free Practice Exam Questions (2026 Updated)

Prepare effectively for your ISC CC CC - Certified in Cybersecurity certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 5 / 6
Total 403 questions

A security event in which an intruder gains or attempts unauthorized access to a system is called:

A.

Intrusion

B.

Exploit

C.

Threat

D.

Attack

An authorized simulated attack to evaluate security is called:

A.

Penetration test

B.

Security testing

C.

Automated testing

D.

Regression testing

Which penetration testing technique requires the team to do the MOST work and effort?

A.

White box

B.

Blue box

C.

Gray box

D.

Black box

Which of these components is very likely to be instrumental to any disaster recovery (DR) effort?

A.

Routers

B.

Laptops

C.

Firewalls

D.

Backups

Type 1 authentication poses which risks?

A.

Users may share their credentials with others

B.

Users may forget their passwords

C.

Passwords may be intercepted and stolen

D.

All

What kind of control is it when we add a backup firewall that takes over if the main one stops working?

A.

Clustering

B.

High availability (HA)

C.

Load balancing

D.

Component redundancy

You experienced a power outage that disrupted access to your data center. What type of security concern occurred?

A.

Availability

B.

Confidentiality

C.

Non-repudiation

D.

Integrity

Activities necessary to restore IT and communications services are known as:

A.

Incident response

B.

Business continuity

C.

Risk management

D.

Disaster recovery

A power outage disrupts operations. Which plan helps sustain operations?

A.

DRP

B.

IRP

C.

BCP

D.

All

Token Ring operates at which OSI layer?

A.

Application

B.

Network

C.

Transport

D.

Physical

To avoid bodily injury claims, a company decides not to offer high-risk services. This is an example of:

A.

Risk Acceptance

B.

Risk Assessment

C.

Risk Avoidance

D.

Risk Control

Which is very likely to be used in a Disaster Recovery effort?

A.

Guard dogs

B.

Contract personnel

C.

Data backups

D.

Anti-malware solutions

Which attack most effectively maintains remote access and control over a victim’s computer?

A.

Phishing

B.

Trojans

C.

XSS

D.

Rootkits

Port forwarding is also known as:

A.

Port mapping

B.

Tunneling

C.

Punch-through

D.

All

Which of the following is NOT a protocol of OSI Layer 3?

A.

IGMP

B.

IP

C.

ICMP

D.

SSH

Which type of control minimizes the impact of an attack and restores normal operations as quickly as possible?

A.

Compensatory control

B.

Corrective control

C.

Recovery control

D.

Detective control

Which type of encryption uses only one shared key to encrypt and decrypt?

A.

Public key

B.

Asymmetric

C.

Symmetric

D.

TCB key

Which of the following is NOT a feature of a cryptographic hash function?

A.

Deterministic

B.

Unique

C.

Useful

D.

Reversible

A previously unknown vulnerability with no public listing is called:

A.

Malware

B.

Zero-day

C.

Event

D.

Attack

Example of a technical control:

A.

Security guard

B.

GPS installed in a vehicle to track location

C.

Door lock

D.

None

Page: 5 / 6
Total 403 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved