Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

CC ISC CC - Certified in Cybersecurity Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC CC CC - Certified in Cybersecurity certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 7
Total 407 questions

Port scanning attack target which OSI layer

A.

Layer 4

B.

Layer 3

C.

Layer 5

D.

Layer 6

Which component of the incident response plan involves identifying critical data and systems?

A.

Detection and Analysis

B.

Preparation

C.

Cantainment

D.

Eradication

If a device is found that is not compliant with the security baseline, what will be the security team action

A.

Report

B.

Evaluate

C.

Ignore

D.

Disabled or isolated into a quarantine area until it can be checked and updated.

An outward-facing IP address used to access the Internet.

A.

Global Address

B.

Private Address

C.

Public Address

D.

DNS

A company experiences a major IT outage and cannot perform its critical business functions. What type of plan will hep the company recover from this event?

A.

BCP

B.

IRP

C DRP

C.

BIA

The DLP solution should be deployed so that it can inspect all forms of data leaving the organization, including:

A.

Posting to web pages/websites

B.

Applications/application programming interfaces (APIs)

C.

Copy to portable media

D.

AII

In DAC, the policy specifies that a subject who has been granted access to information can do the following:

A.

Change security attributes on subjects, objects, information systems or system components

B.

Choose the security attributes to be associated with newly created or revised objects

C.

Change the rules governing access control

D.

ALL

Structured way to align IT with business goals while managing risks and meeting all industry and government regulations

A.

GRC

B.

Policies

C.

Law

D.

Stanfard

Requires that all instances of the data be identical in form,

A.

Confidentiality

B.

Availability

C.

Consistency

D.

ALL

Which type of network is set up similar to the internet but is private to an organization. Select the MOST appropriate?

A.

Extranet

B.

VLAN

C.

Intranet

D.

VPN

Is defined as the process of identifying, estimating and prioritizing risks

A.

Risk Assessment

B.

Risk Treatment

C.

Risk mitigation

D.

Risk Management

Centralized organizational function fulfilled by an information security team that monitors, detects and analyzes events on the network or system to prevent and resolve issues before they result in business disruptions.

A.

IRP

B.

BCP

C.

SOC

D.

DRP

Which of the following is NOT one of the three main components of a sql database?

A.

Views

B.

Schemas

C.

Tables

D.

Object-oriented interfaces

An organization develops a set of procedures to restore critical business processes after a significant disruption. What type of plan is this?

A.

bcp

B.

IRP

C.

DRP

D.

None

organization experiences a security event that potentially jeopardizes the confidentiality, integrity or availability of its information system. What term best describes this situation?

A.

Breach

B.

Event

C.

Incident

D.

Exploit

A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function.

A.

Availability

B.

Criticality

C.

Authorization

D.

Confidentiality

Which of the following is very likely to be used in a disaster recovery (DR) effort?

A.

Guard dogs

B.

Contract personnel

C.

Data backups

D.

Anti-malware solutions

Which of the following is a subject?

A.

file

B.

fence

C.

filename

D.

user

Which of the following does not normally influence an organization's retention policy for logs?

A.

Laws

B.

Corporate governance

C.

Regulations

D.

Audits

255.255.255.0 Address represents

A.

Broadcast

B.

Unicast

C.

Subnet mask

D.

Global Address

Page: 1 / 7
Total 407 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved