Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

CC CC - Certified in Cybersecurity Questions and Answers

Questions 4

A set of security controls or system settings used to ensure uniformity of configuration through the IT environment?

Options:

A.

Patches

B.

Inventory

C.

Baseline

D.

Policy

Buy Now
Questions 5

What kind of control is it when we add a backup firewall that takes over if the main one stops working?

Options:

A.

Clustering

B.

High availability (HA)

C.

Load balancing

D.

Component redundancy

Buy Now
Questions 6

Which access control model is best suited for a large organization with many departments and varied access needs?

Options:

A.

DAC

B.

RBAC

C.

MAC

D.

RuBAC

Buy Now
Questions 7

What goal of security is enhanced by a strong business continuity program?

Options:

A.

Non-repudiation

B.

Availability

C.

Confidentiality

D.

Integrity

Buy Now
Questions 8

A way to prevent unwanted devices from connecting to a network is:

Options:

A.

DMZ

B.

VPN

C.

VLAN

D.

NAC

Buy Now
Questions 9

What is the primary factor in the reliability of information and systems?

Options:

A.

Authenticity

B.

Confidentiality

C.

Integrity

D.

Availability

Buy Now
Questions 10

An event that jeopardizes confidentiality, integrity, or availability is called:

Options:

A.

Breach

B.

Event

C.

Incident

D.

Exploit

Buy Now
Questions 11

What is the purpose of the CIA triad?

Options:

A.

Make security understandable

B.

Describe security concepts

C.

Define the purpose of security

D.

All

Buy Now
Questions 12

Which is very likely to be used in a Disaster Recovery effort?

Options:

A.

Guard dogs

B.

Contract personnel

C.

Data backups

D.

Anti-malware solutions

Buy Now
Questions 13

A one-way spinning door or barrier that allows only one person at a time to enter a building or area.

Options:

A.

Turnstile

B.

Mantrap

C.

Bollard

D.

Gate

Buy Now
Questions 14

The primary goal of a risk assessment is to:

Options:

A.

Avoid risk

B.

Estimate and prioritize risk

C.

Ignore risk

D.

Evaluate only the impact

Buy Now
Questions 15

A logical group of workstations, servers, and network devices that appear to be on the same LAN despite their geographical distribution.

Options:

A.

LAN

B.

VPN

C.

WLAN

D.

VLAN

Buy Now
Questions 16

Which encryption type is used in HTTPS communication?

Options:

A.

Symmetric

B.

Asymmetric

C.

None

D.

Both A and B

Buy Now
Questions 17

Which type of malware encrypts a user’s files and demands payment?

Options:

A.

Worm

B.

Trojan

C.

Virus

D.

Ransomware

Buy Now
Questions 18

Permitting authorized access while preventing improper disclosure.

Options:

A.

Integrity

B.

Confidentiality

C.

Availability

D.

All

Buy Now
Questions 19

Security controls protecting against fire, floods, and earthquakes are:

Options:

A.

Physical controls

B.

Logical controls

C.

Administrative controls

D.

Technical controls

Buy Now
Questions 20

What is the primary goal of input validation?

Options:

A.

Secure storage

B.

Prevent unauthorized access

C.

Prevent code injection attacks

D.

Encrypt data

Buy Now
Questions 21

What is the term used to denote the inherent set of privileges assigned to a user upon the creation of a new account?

Options:

A.

Aggregation

B.

Transitivity

C.

Baseline

D.

Entitlement

Buy Now
Questions 22

Which type of risk involves unauthorized use or disclosure of confidential information such as passwords, financial data, or personal information?

Options:

A.

Compliance risk

B.

Reputational risk

C.

Operational risk

D.

Information risk

Buy Now
Questions 23

What is the end goal of a Disaster Recovery Plan (DRP)?

Options:

A.

All systems backed up

B.

DR site activated

C.

Infrastructure relocated

D.

Business restored to last-known reliable operations

Buy Now
Questions 24

Mark has purchased a Mac laptop. He is scared of losing his screen and is planning to buy an insurance policy. Which risk management strategy is this?

Options:

A.

Risk acceptance

B.

Risk deterrence

C.

Risk transference

D.

Risk mitigation

Buy Now
Questions 25

The order of controls used in defense in depth:

Options:

A.

Assets → Physical → Administrative → Technical

B.

Assets → Administrative → Physical → Technical

C.

Physical → Administrative → Technical → Assets

D.

Assets → Administrative → Technical → Physical

Buy Now
Questions 26

Uses multiple types of access controls in layered fashion to avoid monolithic security:

Options:

A.

DMZ

B.

VLAN

C.

Defense in Depth

D.

VPN

Buy Now
Questions 27

A ________ creates an encrypted tunnel to protect your personal data and communications.

Options:

A.

HTTPS

B.

VPN

C.

Anti-virus

D.

IDS

Buy Now
Questions 28

A measure of an organization’s baseline security performance is a:

Options:

A.

Security assessment

B.

Security audit

C.

Security benchmark

D.

Security management

Buy Now
Questions 29

VLAN hopping belongs to which OSI layer?

Options:

A.

Layer 3

B.

Layer 4

C.

Layer 7

D.

Layer 2

Buy Now
Questions 30

How do you distinguish authentication and identification?

Options:

A.

Both are the same

B.

Authentication verifies identity

C.

Authentication verifies identity; identification claims identity

D.

Identification verifies identity

Buy Now
Questions 31

Mark’s proposed configuration change must be approved and tested by a Change Control Board. This is an example of:

Options:

A.

Holistic security

B.

Defense in depth

C.

Threat intelligence

D.

Segregation of duties

Buy Now
Questions 32

Which concept prevents crime by designing a physical environment that positively influences human behavior?

Options:

A.

DMZ

B.

Security alarm

C.

CPTED

D.

CCTV

Buy Now
Questions 33

The documented set of procedures to detect, respond to, and limit the consequences of cyberattacks is called:

Options:

A.

IR

B.

IRP

C.

BCP

D.

DRP

Buy Now
Questions 34

The purpose of risk identification is:

Options:

A.

Employees at all levels help identify risks

B.

Identify risks to communicate clearly

C.

Identify risks to protect against them

D.

All

Buy Now
Questions 35

Configuration settings or parameters stored as data and managed through a GUI are examples of:

Options:

A.

Logical access control

B.

Physical access control

C.

Administrative access control

Buy Now
Questions 36

What type of attack does the attacker store and reuse login information? Select the BEST answer.

Options:

A.

Man-in-the-middle attack

B.

Smurf attack

C.

DDoS attack

D.

Replay attack

Buy Now
Questions 37

Malicious code that acts like a remotely controlled “robot” for an attacker.

Options:

A.

Rootkit

B.

Malware

C.

Bot

D.

Virus

Buy Now
Questions 38

Which zero-trust component breaks LANs into very small, localized security zones?

Options:

A.

Zero Trust

B.

DMZ

C.

VPN

D.

Microsegmentation

Buy Now
Questions 39

Who is responsible for publishing and signing the organization’s policies?

Options:

A.

The security office

B.

Human resources

C.

Senior management

D.

The legal department

Buy Now
Questions 40

A backup is which type of security control?

Options:

A.

Preventive

B.

Deterrent

C.

Recovery

D.

Corrective

Buy Now
Questions 41

A system crash results in loss of data. What term best describes this?

Options:

A.

Breach

B.

Incident

C.

Event

D.

Adverse event

Buy Now
Questions 42

Which allows extremely granular restrictions down to individual machines or users?

Options:

A.

DMZ

B.

Microsegmentation

C.

VLAN

D.

NAC

Buy Now
Questions 43

A CISO documents a policy establishing acceptable cloud use for all staff. This is an example of:

Options:

A.

Technical control

B.

Physical control

C.

Cloud control

D.

Management / Administrative control

Buy Now
Questions 44

Which provides integrity services that allow a recipient to verify that a message has not been altered?

Options:

A.

Hashing

B.

Encryption

C.

Decryption

D.

Encoding

Buy Now
Questions 45

Walmart has a large e-commerce presence worldwide. Which solution would ensure the LOWEST possible latency for customers using their services?

Options:

A.

CDN

B.

SaaS

C.

Load balancing

D.

Decentralized data centers

Buy Now
Questions 46

Which of the following is the LEAST secure communications protocol?

Options:

A.

CHAP

B.

IPsec

C.

PAP

D.

EAP

Buy Now
Questions 47

Ping flood attacks target which OSI layer?

Options:

A.

Layer 4

B.

Layer 3

C.

Layer 5

D.

Layer 6

Buy Now
Questions 48

A transaction over $50,000 requires approval from both a manager and an accountant. Which concept applies?

Options:

A.

MAC

B.

Defense in Depth

C.

Two-Person Integrity

D.

Principle of Least Privilege

Buy Now
Questions 49

Which of the following is NOT an element of system security configuration management?

Options:

A.

Baselines

B.

Updates

C.

Inventory

D.

Audit logs

Buy Now
Questions 50

According to ISC2 Code of Ethics, to whom does Kristal ultimately report?

Options:

A.

The company

B.

Governments

C.

ISC2

D.

The users

Buy Now
Questions 51

What is the benefit of subnetting?

Options:

A.

By increasing network bandwidth

B.

By improving network security

C.

By reducing network congestion

D.

By simplifying network management

Buy Now
Questions 52

Incident management is also known as:

Options:

A.

Risk management

B.

Business continuity management

C.

Incident management

D.

Crisis management

Buy Now
Questions 53

Faking the sender address to gain unauthorized access is known as:

Options:

A.

Phishing

B.

ARP

C.

Spoofing

D.

All

Buy Now
Questions 54

Which type of control is used to restore systems or processes to their normal state after an attack?

Options:

A.

Compensatory control

B.

Recovery control

C.

Detective control

D.

Corrective control

Buy Now
Questions 55

Which type of software testing focuses on examining the source code for vulnerabilities and security issues?

Options:

A.

Black-box testing

B.

White-box testing

C.

Functional testing

D.

User acceptance testing

Buy Now
Questions 56

Mark is configuring an automated data transfer between two hosts and needs an authentication method. What approach is best suited?

Options:

A.

Biometric

B.

Smart Card

C.

SSH Key

D.

Hard-coded Password

Buy Now
Questions 57

Which port is used by SSH?

Options:

A.

21

B.

23

C.

24

D.

22

Buy Now
Questions 58

Which access control model grants permissions based ondata sensitivityanduser job functions?

Options:

A.

DAC

B.

RBAC

C.

MAC

D.

RuBAC

Buy Now
Questions 59

What is the main challenge in achieving non-repudiation in electronic transactions?

Options:

A.

Verifying sender and recipient identity

B.

Ensuring message authenticity and integrity

C.

Preventing message tampering

D.

All of the above

Buy Now
Questions 60

The method of distributing network traffic equally across a pool of resources is called:

Options:

A.

VLAN

B.

DNS

C.

VPN

D.

Load balancing

Buy Now
Questions 61

During an ISC2 CC exam, you observe another candidate cheating. What should you do?

Options:

A.

Yell at them

B.

Do nothing

C.

Report the candidate to ISC2

D.

Call law enforcement

Buy Now
Questions 62

Why is a “Red Book” important in Business Continuity Planning?

Options:

A.

To have a hard copy for easy access

B.

Easy to carry and transfer

C.

When disasters disable power and electronic access

D.

All

Buy Now
Questions 63

In cybersecurity, typical threat actors include:

Options:

A.

Insiders (intentional or accidental)

B.

External individuals or groups

C.

Technology (bots, automation, AI)

D.

All

Buy Now
Questions 64

What is the primary goal of a risk management process in cybersecurity?

Options:

A.

Eliminate all risks

B.

Transfer all risks

C.

Identify, assess, and mitigate risks to an acceptable level

D.

Ignore risks

Buy Now
Questions 65

Port forwarding is also known as:

Options:

A.

Port mapping

B.

Tunneling

C.

Punch-through

D.

All

Buy Now
Questions 66

Which type of attack takes advantage of vulnerabilities in validation?

Options:

A.

ARP spoofing

B.

Pharming attacks

C.

Cross-site scripting (XSS)

D.

DNS poisoning

Buy Now
Questions 67

What does the term “Two-factor authentication” refer to in cybersecurity?

Options:

A.

Using two different antivirus programs

B.

Verifying identity with two independent factors

C.

Accessing two different networks simultaneously

D.

Changing passwords every two weeks

Buy Now
Questions 68

Which logical control best protects confidential data from unauthorized access?

Options:

A.

Encryption

B.

Firewall

C.

Antivirus

D.

Hashing

Buy Now
Questions 69

Which of the following protocols is a secure alternative to using Telnet?

Options:

A.

SSH

B.

HTTPS

C.

SFTP

D.

LDAPS

Buy Now
Questions 70

Which uses encrypted, machine-generated codes to verify a user's identity?

Options:

A.

Basic authentication

B.

Form-based authentication

C.

Token-based authentication

D.

All

Buy Now
Questions 71

Which of the following documents contains elements that are NOT mandatory?

Options:

A.

Procedures

B.

Policies

C.

Regulations

D.

Guidelines

Buy Now
Questions 72

The means by which a threat actor carries out their objectives.

Options:

A.

Threat

B.

Threat Vector

C.

Exploit

D.

Intrusion

Buy Now
Questions 73

The highest-level governance documents approved by management are:

Options:

A.

Standards

B.

Policies

C.

Procedures

D.

Laws or regulations

Buy Now
Questions 74

In what way do a victim’s files get affected by ransomware?

Options:

A.

By destroying them

B.

By encrypting them

C.

By stealing them

D.

By selling them

Buy Now
Questions 75

A structured way to align IT with business goals while managing risk and regulations:

Options:

A.

GRC

B.

Policies

C.

Law

D.

Standard

Buy Now
Questions 76

What does a breach refer to in the context of cybersecurity?

Options:

A.

An unauthorized access to a system or system resource

B.

Any observable occurrence in a network or system

C.

A deliberate security incident

D.

A previously known system vulnerability

Buy Now
Questions 77

Which is NOT a function of an Intrusion Prevention System (IPS)?

Options:

A.

Encrypt network traffic

B.

Monitor network traffic

C.

Filter network traffic

D.

Detect and prevent attacks

Buy Now
Questions 78

What is the primary goal of incident management?

Options:

A.

To protect life, health, and safety

B.

To reduce the impact of an incident

C.

To prepare for any incident

D.

To resume interrupted operations as soon as possible

Buy Now
Questions 79

What is the range of well-known ports?

Options:

A.

0–1023

B.

1024–49151

C.

49152–65535

D.

None

Buy Now
Questions 80

Which principle aims primarily at fraud detection?

Options:

A.

Defense in depth

B.

Least privilege

C.

Separation of duties

D.

Privileged account

Buy Now
Questions 81

Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

Options:

A.

Brute-force attack

B.

Dictionary attack

C.

Social engineering attack

D.

Replay attack

Buy Now
Questions 82

Which document serves as specifications for implementing policy and dictates mandatory requirements?

Options:

A.

Policy

B.

Guideline

C.

Standard

D.

Procedure

Buy Now
Questions 83

Created by switches to logically segment a network without changing physical topology:

Options:

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Buy Now
Questions 84

Which is NOT a possible model for an Incident Response Team (IRT)?

Options:

A.

Leveraged

B.

Dedicated

C.

Hybrid

D.

Outsourced

Buy Now
Questions 85

Communication between end systems is encrypted using a key, often known as ________?

Options:

A.

Temporary key

B.

Section key

C.

Public key

D.

Session key

Buy Now
Questions 86

A company wants to ensure that its employees can evacuate the building in case of an emergency. Which physical control is best suited?

Options:

A.

Fire alarms

B.

Exit signs

C.

Emergency lighting

D.

Emergency exit doors

Buy Now
Questions 87

255.255.255.0 represents:

Options:

A.

Broadcast address

B.

Unicast address

C.

Subnet mask

D.

Global address

Buy Now
Questions 88

The evaluation of security controls to determine whether they are implemented correctly and operating as intended is known as:

Options:

A.

Security assessment

B.

Risk assessment

C.

DRP

D.

IRP

Buy Now
Questions 89

Which access control method uses attributes and rules evaluated by a central Policy Decision Point (PDP)?

Options:

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

Buy Now
Questions 90

Which of the following is unlikely to be a member of the disaster recovery team?

Options:

A.

Executive management

B.

Public relations

C.

Billing clerk

D.

IT personnel

Buy Now
Questions 91

IDS can be described in terms of what fundamental functional components?

Options:

A.

Response

B.

Information sources

C.

Analysis

D.

All of the choices

Buy Now
Questions 92

Natalia wants to ensure the authenticity of her organization’s domain name records using digital signatures. What technology should she use?

Options:

A.

DNSSIGN

B.

DNSSEC

C.

CERTDNS

D.

DNS2

Buy Now
Questions 93

Which prevents threats?

Options:

A.

Antivirus

B.

IDS

C.

SIEM

D.

HIDS

Buy Now
Questions 94

Which is the loopback address?

Options:

A.

::1

B.

127.0.0.1

C.

255.255.255.0

D.

Both A and B

Buy Now
Questions 95

Which is related to privacy?

Options:

A.

GDPR

B.

FIPS

C.

MOU

D.

All

Buy Now
Questions 96

Which is an example of a deterrent control?

Options:

A.

Biometric

B.

Guard dog

C.

Encryption

D.

Turnstile

Buy Now
Questions 97

The DevOps team has updated the application source code. Tom discovered that many unauthorized changes have been made. What is the BEST control Tom can implement to prevent a recurrence of this problem?

Options:

A.

Backup

B.

File labels

C.

Security audit

D.

Hashing

Buy Now
Questions 98

A popular way of implementing the principle of least privilege is:

Options:

A.

MAC

B.

DAC

C.

RBAC

D.

ABAC

Buy Now
Questions 99

What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?

Options:

A.

Least privilege

B.

Two-person control

C.

Job rotation

D.

Separation of privileges

Buy Now
Questions 100

A DDoS attack flooding ICMP packets is called:

Options:

A.

DoS

B.

SYN flood

C.

Smurf attack

D.

Phishing

Buy Now
Questions 101

Why is identifying roles and responsibilities important in IR planning?

Options:

A.

To prevent incidents

B.

To ensure everyone knows their role

C.

To reduce impact

D.

To select containment strategy

Buy Now
Questions 102

Which type of control minimizes the impact of an attack and restores normal operations as quickly as possible?

Options:

A.

Compensatory control

B.

Corrective control

C.

Recovery control

D.

Detective control

Buy Now
Questions 103

In which phase of an incident response plan are incidents prioritized?

Options:

A.

Post-incident activity

B.

Containment, eradication, and recovery

C.

Detection and analysis

D.

Preparation

Buy Now
Questions 104

Flooding a server with traffic to make services unavailable is called:

Options:

A.

Phishing

B.

Virus

C.

Spoofing

D.

DDoS

Buy Now
Questions 105

A weighted factor based on the probability that a threat will exploit a vulnerability is called:

Options:

A.

Likelihood of occurrence

B.

Threat vector

C.

Risk

D.

Impact

Buy Now
Questions 106

What is the BEST defense against dumpster diving attacks?

Options:

A.

Anti-malware software

B.

Clean desk policy

C.

Data loss prevention tools

D.

Shredding

Buy Now
Questions 107

An employee unintentionally shares confidential information with an unauthorized party. What term best describes this?

Options:

A.

Event

B.

Exploit

C.

Intrusion

D.

Breach

Buy Now
Questions 108

What does Personally Identifiable Information (PII) pertain to?

Options:

A.

Information about an individual's health status

B.

Data about an individual that could be used to identify them

C.

Trade secrets, research, business plans, and intellectual property

D.

The importance assigned to information by its owner

Buy Now
Questions 109

Finance Server and Transaction Server have restored their original facility after a disaster. What should be moved in FIRST?

Options:

A.

Management

B.

Most critical systems

C.

Most critical functions

D.

Least critical functions

Buy Now
Questions 110

A prolonged, targeted cyberattack where an intruder remains undetected for an extended period is called:

Options:

A.

Spoofing

B.

Phishing

C.

DoS

D.

Advanced Persistent Threat

Buy Now
Questions 111

Which is the most efficient and effective way to test a business continuity plan?

Options:

A.

Simulations

B.

Discussions

C.

Walkthroughs

D.

Reviews

Buy Now
Questions 112

Which of the following is NOT one of the three main components of an SQL database?

Options:

A.

Views

B.

Schemas

C.

Tables

D.

Object-oriented interfaces

Buy Now
Questions 113

A measure of the degree to which an organization depends on information or systems to achieve its mission is called:

Options:

A.

Availability

B.

Criticality

C.

Authorization

D.

Confidentiality

Buy Now
Questions 114

What is the primary goal of network segmentation in cybersecurity?

Options:

A.

To increase network speed

B.

To isolate and protect critical assets

C.

To centralize data storage

D.

To expand network coverage

Buy Now
Questions 115

What is the focus of disaster recovery planning after a data center failure?

Options:

A.

Maintain business functions

B.

Fix hardware

C.

Restore IT and communications

D.

Guide emergency responders

Buy Now
Questions 116

Which organization defines Internet protocol standards?

Options:

A.

ISO

B.

NIST

C.

IETF

D.

GDPR

Buy Now
Questions 117

Common network device used to connect networks?

Options:

A.

Server

B.

Endpoint

C.

Router

D.

Switch

Buy Now
Questions 118

Which document identifies the principles and rules governing an organization’s protection of information systems and data?

Options:

A.

Procedure

B.

Guideline

C.

Policy

D.

Standard

Buy Now
Questions 119

A DDoS attack affects which OSI layers?

Options:

A.

Network layer

B.

Transport layer

C.

Physical layer

D.

Both A and B

Buy Now
Questions 120

A previously unknown vulnerability with no public listing is called:

Options:

A.

Malware

B.

Zero-day

C.

Event

D.

Attack

Buy Now
Exam Code: CC
Exam Name: CC - Certified in Cybersecurity
Last Update: Feb 25, 2026
Questions: 403

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99