Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CC ISC CC - Certified in Cybersecurity Free Practice Exam Questions (2026 Updated)

Prepare effectively for your ISC CC CC - Certified in Cybersecurity certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 6
Total 403 questions

Which organization defines Internet protocol standards?

A.

ISO

B.

NIST

C.

IETF

D.

GDPR

In which access control model can the creator of an object delegate permissions?

A.

MAC

B.

RBAC

C.

ABAC

D.

DAC

Which technology should be implemented to increase the work effort required for buffer overflow attacks?

A.

Address Space Layout Randomization

B.

Memory induction application

C.

Input memory isolation

D.

Read-only memory integrity checks

Which protocol would be most suitable to fulfill the secure communication requirements between clients and the server for a company deploying a new application?

A.

FTP

B.

HTTP

C.

HTTPS

D.

SMTP

The primary functionality of Privileged Access Management (PAM) is:

A.

Validate access to a file

B.

Prevent unauthorized access to assets

C.

Provide just-in-time access to critical resources

D.

Manage centralized access control

Which of the following vulnerabilities cannot be discovered during a routine vulnerability assessment?

A.

Zero-day vulnerability

B.

Kernel flaw

C.

Buffer overflow

D.

File and directory permissions

Created by switches to logically segment a network without changing physical topology:

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Which one of the following controls is NOT particularly effective against the insider threat?

A.

Least privilege

B.

Background checks

C.

Firewalls

D.

Separation of duties

Which of the following properties is NOT guaranteed by digital signatures?

A.

Authentication

B.

Confidentiality

C.

Non-repudiation

D.

Integrity

A scam where a malicious website is made to look exactly like a trusted site is called:

A.

DoS

B.

Virus

C.

Spoofing

D.

Phishing

Which is related to standards?

A.

NIST

B.

GDPR

C.

HIPAA

D.

All

What does the term “Two-factor authentication” refer to in cybersecurity?

A.

Using two different antivirus programs

B.

Verifying identity with two independent factors

C.

Accessing two different networks simultaneously

D.

Changing passwords every two weeks

Which device is used to control traffic flow between networks?

A.

SDN

B.

Switch

C.

Hub

D.

Router

Which of the following is a characteristic of cloud computing?

A.

Broad network access

B.

Rapid elasticity

C.

Measured service

D.

All

Who is responsible for publishing and signing the organization’s policies?

A.

The security office

B.

Human resources

C.

Senior management

D.

The legal department

What is the main objective of DRP after a breach shuts down systems?

A.

Relocation

B.

Employee safety

C.

Prosecution

D.

Restore systems

Why is a “Red Book” important in Business Continuity Planning?

A.

To have a hard copy for easy access

B.

Easy to carry and transfer

C.

When disasters disable power and electronic access

D.

All

Natalia wants to ensure the authenticity of her organization’s domain name records using digital signatures. What technology should she use?

A.

DNSSIGN

B.

DNSSEC

C.

CERTDNS

D.

DNS2

A measure combining impact and likelihood is known as:

A.

Impact

B.

Risk

C.

Threat

D.

Threat vector

Raj wants aphysical deterrent controlto discourage unauthorized entry. Which option best serves this purpose?

A.

A wall

B.

Razor tape

C.

A sign

D.

A hidden camera

Page: 1 / 6
Total 403 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved