CC CC - Certified in Cybersecurity Questions and Answers
A set of security controls or system settings used to ensure uniformity of configuration through the IT environment?
What kind of control is it when we add a backup firewall that takes over if the main one stops working?
Which access control model is best suited for a large organization with many departments and varied access needs?
An event that jeopardizes confidentiality, integrity, or availability is called:
A one-way spinning door or barrier that allows only one person at a time to enter a building or area.
A logical group of workstations, servers, and network devices that appear to be on the same LAN despite their geographical distribution.
What is the term used to denote the inherent set of privileges assigned to a user upon the creation of a new account?
Which type of risk involves unauthorized use or disclosure of confidential information such as passwords, financial data, or personal information?
Mark has purchased a Mac laptop. He is scared of losing his screen and is planning to buy an insurance policy. Which risk management strategy is this?
Uses multiple types of access controls in layered fashion to avoid monolithic security:
A ________ creates an encrypted tunnel to protect your personal data and communications.
Mark’s proposed configuration change must be approved and tested by a Change Control Board. This is an example of:
Which concept prevents crime by designing a physical environment that positively influences human behavior?
The documented set of procedures to detect, respond to, and limit the consequences of cyberattacks is called:
Configuration settings or parameters stored as data and managed through a GUI are examples of:
What type of attack does the attacker store and reuse login information? Select the BEST answer.
Which zero-trust component breaks LANs into very small, localized security zones?
Which allows extremely granular restrictions down to individual machines or users?
A CISO documents a policy establishing acceptable cloud use for all staff. This is an example of:
Which provides integrity services that allow a recipient to verify that a message has not been altered?
Walmart has a large e-commerce presence worldwide. Which solution would ensure the LOWEST possible latency for customers using their services?
A transaction over $50,000 requires approval from both a manager and an accountant. Which concept applies?
Which of the following is NOT an element of system security configuration management?
Which type of control is used to restore systems or processes to their normal state after an attack?
Which type of software testing focuses on examining the source code for vulnerabilities and security issues?
Mark is configuring an automated data transfer between two hosts and needs an authentication method. What approach is best suited?
Which access control model grants permissions based ondata sensitivityanduser job functions?
What is the main challenge in achieving non-repudiation in electronic transactions?
The method of distributing network traffic equally across a pool of resources is called:
During an ISC2 CC exam, you observe another candidate cheating. What should you do?
Which logical control best protects confidential data from unauthorized access?
A structured way to align IT with business goals while managing risk and regulations:
Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?
Which document serves as specifications for implementing policy and dictates mandatory requirements?
Created by switches to logically segment a network without changing physical topology:
Communication between end systems is encrypted using a key, often known as ________?
A company wants to ensure that its employees can evacuate the building in case of an emergency. Which physical control is best suited?
The evaluation of security controls to determine whether they are implemented correctly and operating as intended is known as:
Which access control method uses attributes and rules evaluated by a central Policy Decision Point (PDP)?
Which of the following is unlikely to be a member of the disaster recovery team?
Natalia wants to ensure the authenticity of her organization’s domain name records using digital signatures. What technology should she use?
The DevOps team has updated the application source code. Tom discovered that many unauthorized changes have been made. What is the BEST control Tom can implement to prevent a recurrence of this problem?
What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?
Which type of control minimizes the impact of an attack and restores normal operations as quickly as possible?
A weighted factor based on the probability that a threat will exploit a vulnerability is called:
An employee unintentionally shares confidential information with an unauthorized party. What term best describes this?
Finance Server and Transaction Server have restored their original facility after a disaster. What should be moved in FIRST?
A prolonged, targeted cyberattack where an intruder remains undetected for an extended period is called:
Which is the most efficient and effective way to test a business continuity plan?
Which of the following is NOT one of the three main components of an SQL database?
A measure of the degree to which an organization depends on information or systems to achieve its mission is called:
Which document identifies the principles and rules governing an organization’s protection of information systems and data?