Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CC ISC CC - Certified in Cybersecurity Free Practice Exam Questions (2026 Updated)

Prepare effectively for your ISC CC CC - Certified in Cybersecurity certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 6 / 6
Total 403 questions

What is the focus of disaster recovery planning after a data center outage?

A.

Maintaining business functions

B.

Fixing hardware

C.

Restoring IT and communications

D.

Emergency response guidance

What is the first step in incident response planning?

A.

Develop a management-approved policy

B.

Identify critical systems

C.

Train staff

D.

Form the IR team

The common term for systems that control temperature and humidity in a data center is:

A.

VLAN

B.

STAT

C.

TAWC

D.

HVAC

Faking the sender address of a transmission to gain illegal entry is called:

A.

Phishing

B.

ARP

C.

Spoofing

D.

All

Example of token-based authentication:

A.

Kerberos

B.

Basic

C.

OAuth

D.

NTLM

Exhibit.

What is the purpose of a Security Information and Event Management (SIEM) system?

A.

Encrypting files

B.

Monitoring and analyzing security events -

C.

Blocking malicious websites

D.

Managing user passwords

How do you distinguish authentication and identification?

A.

Both are the same

B.

Authentication verifies identity

C.

Authentication verifies identity; identification claims identity

D.

Identification verifies identity

Which OSI layer associates MAC addresses with network devices?

A.

Physical layer

B.

Network layer

C.

Data Link layer

D.

Transport layer

Permitting authorized access while preventing improper disclosure.

A.

Integrity

B.

Confidentiality

C.

Availability

D.

All

A structured approach used to oversee and manage risk for an enterprise is called:

A.

Risk assessment

B.

Risk threshold

C.

Risk Management Framework

D.

Risk appetite

Which element of the security policy framework includes recommendations that are NOT binding?

A.

Procedures

B.

Guidelines

C.

Standards

D.

Policies

Who should participate in creating a Business Continuity Plan?

A.

Management only

B.

IT only

C.

Finance only

D.

Members across the organization

Which one of the following cryptographic algorithms does NOT depend upon the prime factorization problem?

A.

RSA – Rivest-Shamir-Adleman

B.

GPG – GNU Privacy Guard

C.

ECC – Elliptic Curve Cryptosystem

D.

PGP – Pretty Good Privacy

What is the difference between a hub and a switch?

A.

A hub is less likely to be used in home networks

B.

A hub can create separate broadcast domains

C.

A hub retransmits traffic to all devices, while a switch sends traffic only to the intended device

D.

A switch retransmits traffic to all devices

Which type of malware encrypts a user’s files and demands payment?

A.

Worm

B.

Trojan

C.

Virus

D.

Ransomware

An unusual occurrence in a system or network is best described as:

A.

Breach

B.

Exploit

C.

Event

D.

Intrusion

A system crash results in loss of data. What term best describes this?

A.

Breach

B.

Incident

C.

Event

D.

Adverse event

Methods or mechanisms used to gain unauthorized access are called:

A.

Attacker

B.

Threat vector

C.

Threat

D.

Threat actor

Which approach involves a continuous cycle of identifying, assessing, prioritizing, and mitigating cybersecurity risks?

A.

Security assessment

B.

Incident response

C.

Penetration testing

D.

Risk management

A CISO documents a policy establishing acceptable cloud use for all staff. This is an example of:

A.

Technical control

B.

Physical control

C.

Cloud control

D.

Management / Administrative control

Page: 6 / 6
Total 403 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved