Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

ISC CC Dumps

Page: 1 / 40
Total 403 questions

CC - Certified in Cybersecurity Questions and Answers

Question 1

What is remanence?

Options:

A.

The ability of retaining magnetization in a storage disk after deletion

B.

Files or pieces of files get scattered throughout your disks

C.

Data corruption due to disk failure

D.

All

Question 2

Natalia wants to ensure the authenticity of her organization’s domain name records using digital signatures. What technology should she use?

Options:

A.

DNSSIGN

B.

DNSSEC

C.

CERTDNS

D.

DNS2

Question 3

Which of the following is often associated with Disaster Recovery planning?

Options:

A.

Checklists

B.

Antivirus

C.

Firewalls

D.

All

Question 4

A transaction over $50,000 requires approval from both a manager and an accountant. Which concept applies?

Options:

A.

MAC

B.

Defense in Depth

C.

Two-Person Integrity

D.

Principle of Least Privilege

Question 5

XenServer, LVM, Hyper-V, and ESXi are:

Options:

A.

Type 2 hypervisors

B.

Type 1 hypervisors

C.

Both

D.

None

Question 6

What cybersecurity principle focuses on granting users only the privileges necessary to perform their job functions?

Options:

A.

Least privilege

B.

Defense in depth

C.

Separation of duties

D.

Need-to-know basis

Question 7

255.255.255.0 represents:

Options:

A.

Broadcast address

B.

Unicast address

C.

Subnet mask

D.

Global address

Question 8

An organization develops procedures to restore critical business processes after a major disruption. What plan is this?

Options:

A.

BCP

B.

IRP

C.

DRP

D.

None

Question 9

Load balancing primarily safeguards which CIA triad element?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

All

Question 10

A power outage disrupts operations. Which plan helps sustain operations?

Options:

A.

DRP

B.

IRP

C.

BCP

D.

All

Question 11

Security commensurate with risk and magnitude of harm is known as:

Options:

A.

Risk management

B.

Risk assessment

C.

Risk mitigation

D.

Adequate security

Question 12

What is the highest priority during incident response?

Options:

A.

Protect mission

B.

Reduce impact

C.

Protect life, health, and safety

D.

Resume operations

Question 13

A system architecture where one instance serves multiple user groups:

Options:

A.

Multithreading

B.

Multiprocessing

C.

Multitenancy

D.

Multi-cloud

Question 14

The magnitude of harm expected from unauthorized disclosure, modification, destruction, or loss of information is known as:

Options:

A.

Threat

B.

Vulnerability

C.

Impact

D.

Likelihood

Question 15

Exhibit.

IPSec works in which layer of OSI Model

Options:

A.

Layer 2

B.

Layer 5

C.

Layer 3

D.

Layer 7

Question 16

A ________ creates an encrypted tunnel to protect your personal data and communications.

Options:

A.

HTTPS

B.

VPN

C.

Anti-virus

D.

IDS

Question 17

Which provides confidentiality by hiding or obscuring a message so it cannot be understood by unauthorized parties?

Options:

A.

Hashing

B.

Encoding

C.

Cryptography

D.

All

Question 18

What is an IP address?

Options:

A.

A physical address

B.

A vendor identifier

C.

A logical address associated with a network interface

D.

A hardware address

Question 19

Which access control model is best suited for a large organization with many departments and varied access needs?

Options:

A.

DAC

B.

RBAC

C.

MAC

D.

RuBAC

Question 20

Often offered by third-party organizations and covering advisory or compliance objectives:

Options:

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or Regulations

Question 21

What is a threat in cybersecurity?

Options:

A.

A system weakness

B.

Something to protect

C.

A method of attack

D.

A person or thing that exploits vulnerabilities

Question 22

Which allows extremely granular restrictions down to individual machines or users?

Options:

A.

DMZ

B.

Microsegmentation

C.

VLAN

D.

NAC

Question 23

Faking the sender address to gain unauthorized access is known as:

Options:

A.

Phishing

B.

ARP

C.

Spoofing

D.

All

Question 24

Which physical controls protect against electromagnetic eavesdropping?

Options:

A.

EMI shielding

B.

Screening rooms

C.

White noise generators

D.

All

Question 25

Which of the following is NOT a feature of a cryptographic hash function?

Options:

A.

Deterministic

B.

Unique

C.

Useful

D.

Reversible

Question 26

Which of the following is the LEAST secure communications protocol?

Options:

A.

CHAP

B.

IPsec

C.

PAP

D.

EAP

Question 27

The order of controls used in defense in depth:

Options:

A.

Assets → Physical → Administrative → Technical

B.

Assets → Administrative → Physical → Technical

C.

Physical → Administrative → Technical → Assets

D.

Assets → Administrative → Technical → Physical

Question 28

Removing the belief that a network has any trusted space and enforcing security at the most granular level is known as:

Options:

A.

Zero Trust

B.

Defense in Depth

C.

Least Privilege

D.

All

Question 29

An entity that exploits system vulnerabilities is known as a:

Options:

A.

Attacker

B.

Threat vector

C.

Threat

D.

Threat actor

Question 30

What is the shortened form of

2001:0db8:0000:0000:0000:ffff:0000:0001?

Options:

A.

2001:db8::ffff:0:1

B.

2001:db8:0000:ffff:0:1

C.

2001:db80::ffff:0000:1

D.

2001:db8::ffff:0000:0001

Question 31

Mark is configuring an automated data transfer between two hosts and needs an authentication method. What approach is best suited?

Options:

A.

Biometric

B.

Smart Card

C.

SSH Key

D.

Hard-coded Password

Question 32

Which type of network is set up similar to the internet but is private to an organization? Select the MOST appropriate answer.

Options:

A.

Extranet

B.

VLAN

C.

Intranet

D.

VPN

Question 33

Who should participate in creating a BCP?

Options:

A.

IT only

B.

Management only

C.

Members across the organization

D.

Finance only

Question 34

Which plan provides immediate response procedures and management guidance?

Options:

A.

BCP

B.

IRP

C.

DRP

D.

All

Question 35

What is the importance of non-repudiation in today’s world of e-commerce?

Options:

A.

Ensures people are not held responsible for transactions they did not conduct

B.

Ensures people are held responsible for transactions they conducted

C.

Ensures transactions are not conducted online

D.

Ensures transactions are conducted online

Question 36

Which fire suppression system is more friendly to electronics?

Options:

A.

Carbon dioxide–based

B.

Chemical-based

C.

Water-based

D.

Foam-based

Question 37

Which zero-trust component breaks LANs into very small, localized security zones?

Options:

A.

Zero Trust

B.

DMZ

C.

VPN

D.

Microsegmentation

Question 38

Which uses encrypted, machine-generated codes to verify a user's identity?

Options:

A.

Basic authentication

B.

Form-based authentication

C.

Token-based authentication

D.

All

Question 39

When the ISC2 mail server sends mail to other mail servers, it becomes a —?

Options:

A.

SMTP Server

B.

SMTP Peer

C.

SMTP Master

D.

SMTP Client

Question 40

Which of the following protocols is a secure alternative to using Telnet?

Options:

A.

SSH

B.

HTTPS

C.

SFTP

D.

LDAPS

Question 41

What is the purpose of defense in depth?

Options:

A.

Implement only technical controls

B.

Provide unrestricted access

C.

Establish multiple layered security controls

D.

Guarantee no cyberattacks

Question 42

A company wants to ensure that its employees can evacuate the building in case of an emergency. Which physical control is best suited?

Options:

A.

Fire alarms

B.

Exit signs

C.

Emergency lighting

D.

Emergency exit doors

Question 43

Granting a user access to services or a system is known as:

Options:

A.

Authentication

B.

Identification

C.

Authorization

D.

Confidentiality

Question 44

A set of rules that everyone must comply with and that usually carry monetary penalties for noncompliance are:

Options:

A.

Standards

B.

Policies

C.

Procedures

D.

Laws or regulations

Question 45

Which protocol would be most suitable to fulfill the secure communication requirements between clients and the server for a company deploying a new application?

Options:

A.

FTP

B.

HTTP

C.

HTTPS

D.

SMTP

Question 46

Why is identifying roles and responsibilities important in IR planning?

Options:

A.

To prevent incidents

B.

To ensure everyone knows their role

C.

To reduce impact

D.

To select containment strategy

Question 47

An employee launched a privilege escalation attack to gain root access on one of the organization’s database servers. The employee has an authorized user account on the server. What log file would MOST likely contain relevant information?

Options:

A.

Database application log

B.

Firewall log

C.

Operating system log

D.

IDS log

Question 48

An unknown person obtains unauthorized access to the company file system. This is an example of:

Options:

A.

Intrusion

B.

Breach

C.

Exploit

D.

Incident

Question 49

Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?

Options:

A.

Non-repudiation

B.

Integrity

C.

Availability

D.

Confidentiality

Question 50

Activities necessary to restore IT and communications services are known as:

Options:

A.

Incident response

B.

Business continuity

C.

Risk management

D.

Disaster recovery

Question 51

Representation of data at OSI Layer 3 is called a:

Options:

A.

Segment

B.

Packet

C.

Frame

D.

None of the above

Question 52

Hashing safeguards which CIA triad principle?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

All

Question 53

Which service uses a registered port?

Options:

A.

HTTP

B.

SMB

C.

TCP

D.

MS SQL Server

Question 54

The primary functionality of Privileged Access Management (PAM) is:

Options:

A.

Validate access to a file

B.

Prevent unauthorized access to assets

C.

Provide just-in-time access to critical resources

D.

Manage centralized access control

Question 55

Ignoring a risk and continuing business operations is known as:

Options:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk avoidance

D.

Risk transfer

Question 56

TCP and UDP reside at which layer of the OSI model?

Options:

A.

Session

B.

Transport

C.

Data Link

D.

Presentation

Question 57

Four main components of Incident Response are:

Options:

A.

Preparation, Detection and Analysis, Containment, Eradication and Recovery

B.

Preparation, Detection, Analysis and Containment

C.

Detection, Analysis, Containment, Eradication and Recovery

D.

All

Question 58

Derrick logs on to a system in order to read a file. In this example, Derrick is the ______?

Options:

A.

Subject

B.

Object

C.

Process

D.

Predicate

Question 59

IDS can be described in terms of what fundamental functional components?

Options:

A.

Response

B.

Information sources

C.

Analysis

D.

All of the choices

Question 60

What drove the introduction of IPv6?

Options:

A.

IPv4 was insecure

B.

IPv4 was incompatible

C.

IPv4 address exhaustion

D.

IPv6 supports Wi-Fi

Question 61

Protection against an individual falsely denying having performed a particular action.

Options:

A.

Authentication

B.

Identification

C.

Verification

D.

Non-repudiation

Question 62

Which authentication enables automatic identification across multiple service providers?

Options:

A.

Basic

B.

Kerberos

C.

Token-based

D.

Federated

Question 63

Permitting authorized access while preventing improper disclosure.

Options:

A.

Integrity

B.

Confidentiality

C.

Availability

D.

All

Question 64

Walmart has a large e-commerce presence worldwide. Which solution would ensure the LOWEST possible latency for customers using their services?

Options:

A.

CDN

B.

SaaS

C.

Load balancing

D.

Decentralized data centers

Question 65

A popular way of implementing the principle of least privilege is:

Options:

A.

MAC

B.

DAC

C.

RBAC

D.

ABAC

Question 66

Which of the following is an endpoint?

Options:

A.

Router

B.

Firewall

C.

Laptop

D.

Switch

Question 67

What is the purpose of immediate response procedures in a BCP?

Options:

A.

To notify personnel the BCP is activated

B.

To guide management

C.

To protect CIA

D.

To account for operations

Question 68

COVID-19 is an example where which plan sustains business?

Options:

A.

IRP

B.

DRP

C.

BCP

D.

All

Question 69

A scam where a malicious website is made to look exactly like a trusted site is called:

Options:

A.

DoS

B.

Virus

C.

Spoofing

D.

Phishing

Question 70

What is the primary factor in the reliability of information and systems?

Options:

A.

Authenticity

B.

Confidentiality

C.

Integrity

D.

Availability

Question 71

A company analyzes system requirements, functions, and interdependencies to prioritize contingency needs. What is this process called?

Options:

A.

BCP

B.

DRP

C.

IRP

D.

BIA

Question 72

Which OSI layer associates MAC addresses with network devices?

Options:

A.

Physical layer

B.

Network layer

C.

Data Link layer

D.

Transport layer

Question 73

Which scenario best represents defense in depth?

Options:

A.

Relying only on a firewall

B.

Storing all data on one server

C.

Requiring only a username and password

D.

None

Question 74

Which approach involves a continuous cycle of identifying, assessing, prioritizing, and mitigating cybersecurity risks?

Options:

A.

Security assessment

B.

Incident response

C.

Penetration testing

D.

Risk management

Question 75

Why is the recovery of IT often crucial to the recovery and sustainment of business operations?

Options:

A.

IT is not important to business operations

B.

IT is often the cause of disasters

C.

IT can be easily recovered without impact

D.

Many businesses rely heavily on IT for operations

Question 76

Which type of attack takes advantage of vulnerabilities in validation?

Options:

A.

ARP spoofing

B.

Pharming attacks

C.

Cross-site scripting (XSS)

D.

DNS poisoning

Question 77

Which IR phase involves identifying critical data and systems?

Options:

A.

Detection and analysis

B.

Preparation

C.

Containment

D.

Eradication

Question 78

A CISO documents a policy establishing acceptable cloud use for all staff. This is an example of:

Options:

A.

Technical control

B.

Physical control

C.

Cloud control

D.

Management / Administrative control

Question 79

In cybersecurity, typical threat actors include:

Options:

A.

Insiders (intentional or accidental)

B.

External individuals or groups

C.

Technology (bots, automation, AI)

D.

All

Question 80

An external entity has tried to gain access to your organization’s IT environment without authorization. This is an example of a(n):

Options:

A.

Exploit

B.

Intrusion

C.

Event

D.

Malware

Question 81

Removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset. Microsegmentation of workloads is a tool of the model.

Options:

A.

Zero Trust

B.

DMZ

C.

VLAN

D.

Microsegmentation

Question 82

Which encryption type is used in HTTPS communication?

Options:

A.

Symmetric

B.

Asymmetric

C.

None

D.

Both A and B

Question 83

Created by switches to logically segment a network without changing physical topology:

Options:

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Question 84

David is worried about distributed denial-of-service (DDoS) attacks against his company’s primary web application. Which option will provide the MOST resilience against large-scale DDoS attacks?

Options:

A.

Implement a CDN

B.

Increase the number of servers in the web application cluster

C.

Contract for DDoS mitigation services via the company’s IPS

D.

Increase bandwidth from one or more ISPs

Question 85

Exhibit.

as

information security is not built on which of the following?

Options:

A.

Confidentiality

B.

Availability

C.

Accessibility

D.

Integrity

Question 86

What is the benefit of subnetting?

Options:

A.

By increasing network bandwidth

B.

By improving network security

C.

By reducing network congestion

D.

By simplifying network management

Question 87

System capabilities designed to detect and prevent unauthorized use and transmission of information are known as:

Options:

A.

SOC

B.

SIEM solutions

C.

Data Loss Prevention

D.

Cryptography

Question 88

What is the main purpose of creating a baseline for system integrity?

Options:

A.

To compare baseline with current system state

B.

To protect information

C.

To understand current state

D.

All

Question 89

A previously unknown vulnerability with no public listing is called:

Options:

A.

Malware

B.

Zero-day

C.

Event

D.

Attack

Question 90

Which of the following best describes a zero-day vulnerability?

Options:

A.

A vulnerability that has been identified and patched

B.

A vulnerability that has not yet been discovered or publicly disclosed

C.

A vulnerability exploitable only by experts

D.

A vulnerability that affects only legacy systems

Question 91

Which access control model can grant access to a given object based on complex rules?

Options:

A.

ABAC

B.

DAC

C.

MAC

D.

RBAC

Question 92

The practice of sending fraudulent communications that appear to come from a reputable source is known as:

Options:

A.

DoS

B.

Virus

C.

Spoofing

D.

Phishing

Question 93

What is an IPSec replay attack?

Options:

A.

An attack where an attacker modifies packets in transit

B.

An attack where an attacker eavesdrops on network traffic

C.

An attack where an attacker overloads a network with traffic

D.

An attack where an attacker attempts to inject packets in an existing session

Question 94

Which is NOT a possible model for an Incident Response Team (IRT)?

Options:

A.

Leveraged

B.

Dedicated

C.

Hybrid

D.

Outsourced

Question 95

Which of the following properties is NOT guaranteed by digital signatures?

Options:

A.

Authentication

B.

Confidentiality

C.

Non-repudiation

D.

Integrity

Question 96

In which phase of an incident response plan are incidents prioritized?

Options:

A.

Post-incident activity

B.

Containment, eradication, and recovery

C.

Detection and analysis

D.

Preparation

Question 97

What is the purpose of a Business Impact Analysis (BIA)?

Options:

A.

Restore IT services

B.

Mitigate security violations

C.

Provide DRP overview

D.

Analyze system requirements to determine recovery priorities

Question 98

Which of these components is very likely to be instrumental to any disaster recovery (DR) effort?

Options:

A.

Routers

B.

Laptops

C.

Firewalls

D.

Backups

Question 99

The DevOps team has updated the application source code. Tom discovered that many unauthorized changes have been made. What is the BEST control Tom can implement to prevent a recurrence of this problem?

Options:

A.

Backup

B.

File labels

C.

Security audit

D.

Hashing

Question 100

Which type of authentication issomething which you know?

Options:

A.

Type 1

B.

Type 2

C.

Type 3

D.

Type 4

Question 101

Why is security training important?

Options:

A.

Because it fulfills regulatory requirements

B.

Because it helps people perform job duties more efficiently

C.

Because it reduces the risk of attacks such as social engineering

D.

All

Question 102

Which OSI layer does a VPN primarily operate at?

Options:

A.

Layer 5

B.

Layer 6

C.

Layer 1

D.

Layer 3

Question 103

A DLP solution should be deployed so it can inspect all forms of data leaving the organization, including:

Options:

A.

Posting to websites

B.

Applications and APIs

C.

Copying to portable media

D.

All

Question 104

What is privacy in the context of Information Security?

Options:

A.

Protecting data from unauthorized access

B.

Ensuring data is accurate and unchanged

C.

Making sure data is always accessible when needed

D.

Disclosed without their consent

Question 105

Embedded systems and network-enabled devices that communicate with the Internet are considered:

Options:

A.

Endpoint

B.

Node

C.

IoT

D.

Router

Question 106

During an ISC2 CC exam, you observe another candidate cheating. What should you do?

Options:

A.

Yell at them

B.

Do nothing

C.

Report the candidate to ISC2

D.

Call law enforcement

Question 107

What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?

Options:

A.

Least privilege

B.

Two-person control

C.

Job rotation

D.

Separation of privileges

Question 108

The means by which a threat actor carries out their objectives.

Options:

A.

Threat

B.

Threat Vector

C.

Exploit

D.

Intrusion

Question 109

A company experiences a major IT outage and cannot perform critical business functions. Which plan helps recovery?

Options:

A.

BCP

B.

IRP

C.

DRP

D.

BIA

Question 110

Critical business functions are disrupted due to a system outage. Which plan sustains operations?

Options:

A.

DRP

B.

BCP

C.

IRP

D.

All

Question 111

According to ISC2 Code of Ethics, to whom does Kristal ultimately report?

Options:

A.

The company

B.

Governments

C.

ISC2

D.

The users

Question 112

Which penetration testing technique requires the team to do the MOST work and effort?

Options:

A.

White box

B.

Blue box

C.

Gray box

D.

Black box

Question 113

What doescriticalityrepresent?

Options:

A.

Consultation needs

B.

The importance of data or systems to mission success

C.

Availability requirements

D.

All of the above

Question 114

Which access control method uses attributes and rules evaluated by a central Policy Decision Point (PDP)?

Options:

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

Question 115

What is a security token used to authenticate a user to a web application, typically after they log in?

Options:

A.

CAPTCHA

B.

API key

C.

CSRF token

D.

Session token

Question 116

Which protocol is used for secure email?

Options:

A.

POP3S

B.

IMAPS

C.

SMTPS

D.

All

Question 117

A LAN-based attack involving malicious packets sent to the default gateway:

Options:

A.

ARP poisoning

B.

SYN flood

C.

Ping of death

D.

Trojan

Question 118

The prevention of authorized access to resources or the delaying of time-critical operations is known as:

Options:

A.

ARP poisoning

B.

SYN flood

C.

Denial-of-Service (DoS)

D.

All

Question 119

The evaluation of security controls to determine whether they are implemented correctly and operating as intended is known as:

Options:

A.

Security assessment

B.

Risk assessment

C.

DRP

D.

IRP

Question 120

Which organization defines Internet protocol standards?

Options:

A.

ISO

B.

NIST

C.

IETF

D.

GDPR

Page: 1 / 40
Total 403 questions