Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

CC ISC CC - Certified in Cybersecurity Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC CC CC - Certified in Cybersecurity certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 6 / 7
Total 407 questions

Restoring IT and communications back to full operation after a disruption.

A.

BCP

B.

IRP

C.

DRP

D.

None

Which penetration testing technique requires the team to do the MOST work and effort?

A.

White box

B.

Blue box

C.

Gray box

D.

Black box

Walmart has large ecommerce presence in world. Which of these solutions would ensure the LOWEST possible latency for their customers using their services?

A.

CDN

B.

SaaS

C.

Load Balancing

D.

Decentralized Data Centers

What is the purpose of non-repudiation in information security?

A.

To ensure data is always accessible when needed

B.

To protect data from unauthorized access

C.

To prevent the sender or recipient of a message from denying having sent or received the message

D.

To ensure data is accurate and unchanged

The primary functionality of PAM is?

A.

Validate the level of access a user have to a file

B.

Prevent unauthorized access to organizational assets

C.

Provide just-in-time access to critical resources

D.

Manage centralized access control

Mark works in the security office. During research, Mark learns that a configuration change could better protect the organization's IT environment. Mark makes a proposal for this change, but the change cannot be implemented until it is approved, tested, and then cleared for deployment by the Change Control Board. This is an example of__________

A.

Holistic security

B.

Defense in depth

C.

Threat intelligence

D.

Segregation of duties

are events that may indicate that an organization's systems or data have been compromised or that measures put in place to protect them have failed

A.

Exploit

B.

Security Incident

C.

Threat

D.

Rreach

A company wants to ensure that its employees can evacuate the building in case of an emergency which physical control is best suited for this scenario

A.

Fire Alarms

B.

Exit signs

C.

Emergency lighting

D.

Emergency exit doors

What is the first component the new security engineer should learn about in the incident response plan?

A.

Detection and analysis

B.

Preparation

C.

Containment

D.

Eradication

An unknown person obtaining access to the company file system without authorization is example of

A.

Intrusion

B.

Breach

C.

Exploit

D.

Incident

John was recently offered a consulting opportunity as a side job. He is concerned that this might constitute a conflict of interest. Which one of the following sources that he needs to refer to take an appropriate decision?

A.

ISC2 Code of ethics

B.

Organizational code of ethics

C.

Country code of ethics

D.

Organizational security policy

What is the primary goal of a risk management process in cybersecurity?

A.

to eliminate all cybersecurity risks

B.

to transfer all cybersecurity risks to a third party

C.

to identify, assess, and mitigate cybersecurity risks to an acceptable level (Correct)

D.

to ignore cybersecurity risks and focus on incident response

6 Which access control method uses attributes and rules to define access policies that are evaluate by a central Policy Decision Point (PDP)

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

Which type of control is used to identify that an attack has occurred or is currently occurring

A.

Preventive control

B.

Detective control

C.

Corrective control

D.

Recovery control

What does a breach refer to in the context of cybersecurity

A.

An unauthorized access to a system or system recours

B.

Any observable occurance in a network or system

C.

A deiberate security incident

D.

A previously know system vulnerablity

A company primary data center goes down due to a hardware failure causing a major disruption to the IT and communications systems. What is the focus of disaster recovery planning in this scenario

A.

Maintaining critical business functions during the disruption

B.

Fixing the hardware failure

C.

Restoring IT and communications back to full operations after the disruptions

D.

Guiding the actions of emergency response personnel during the disruption

Which layer provides the services to user?

A.

Application layers

B.

Session Layers

C.

Presentation Layer

D.

Physical Layer

Which type of attack will most effectively maintain remote access and control over the victims computer

A.

Phising

B.

Trojans

C.

XSS

D.

RootKits

An attackers place themselves between two devices (often a web browser and a web server)

A.

Phishing

B.

Spoofing

C.

On Path

D.

All

Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model.

A.

Segment

B.

Packet

C.

Frame

D.

None of the Above

Page: 6 / 7
Total 407 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved