CC - Certified in Cybersecurity Questions and Answers
What is remanence?
Natalia wants to ensure the authenticity of her organization’s domain name records using digital signatures. What technology should she use?
Which of the following is often associated with Disaster Recovery planning?
A transaction over $50,000 requires approval from both a manager and an accountant. Which concept applies?
XenServer, LVM, Hyper-V, and ESXi are:
What cybersecurity principle focuses on granting users only the privileges necessary to perform their job functions?
255.255.255.0 represents:
An organization develops procedures to restore critical business processes after a major disruption. What plan is this?
Load balancing primarily safeguards which CIA triad element?
A power outage disrupts operations. Which plan helps sustain operations?
Security commensurate with risk and magnitude of harm is known as:
What is the highest priority during incident response?
A system architecture where one instance serves multiple user groups:
The magnitude of harm expected from unauthorized disclosure, modification, destruction, or loss of information is known as:
Exhibit.
IPSec works in which layer of OSI Model
A ________ creates an encrypted tunnel to protect your personal data and communications.
Which provides confidentiality by hiding or obscuring a message so it cannot be understood by unauthorized parties?
What is an IP address?
Which access control model is best suited for a large organization with many departments and varied access needs?
Often offered by third-party organizations and covering advisory or compliance objectives:
What is a threat in cybersecurity?
Which allows extremely granular restrictions down to individual machines or users?
Faking the sender address to gain unauthorized access is known as:
Which physical controls protect against electromagnetic eavesdropping?
Which of the following is NOT a feature of a cryptographic hash function?
Which of the following is the LEAST secure communications protocol?
The order of controls used in defense in depth:
Removing the belief that a network has any trusted space and enforcing security at the most granular level is known as:
An entity that exploits system vulnerabilities is known as a:
What is the shortened form of
2001:0db8:0000:0000:0000:ffff:0000:0001?
Mark is configuring an automated data transfer between two hosts and needs an authentication method. What approach is best suited?
Which type of network is set up similar to the internet but is private to an organization? Select the MOST appropriate answer.
Who should participate in creating a BCP?
Which plan provides immediate response procedures and management guidance?
What is the importance of non-repudiation in today’s world of e-commerce?
Which fire suppression system is more friendly to electronics?
Which zero-trust component breaks LANs into very small, localized security zones?
Which uses encrypted, machine-generated codes to verify a user's identity?
When the ISC2 mail server sends mail to other mail servers, it becomes a —?
Which of the following protocols is a secure alternative to using Telnet?
What is the purpose of defense in depth?
A company wants to ensure that its employees can evacuate the building in case of an emergency. Which physical control is best suited?
Granting a user access to services or a system is known as:
A set of rules that everyone must comply with and that usually carry monetary penalties for noncompliance are:
Which protocol would be most suitable to fulfill the secure communication requirements between clients and the server for a company deploying a new application?
Why is identifying roles and responsibilities important in IR planning?
An employee launched a privilege escalation attack to gain root access on one of the organization’s database servers. The employee has an authorized user account on the server. What log file would MOST likely contain relevant information?
An unknown person obtains unauthorized access to the company file system. This is an example of:
Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?
Activities necessary to restore IT and communications services are known as:
Representation of data at OSI Layer 3 is called a:
Hashing safeguards which CIA triad principle?
Which service uses a registered port?
The primary functionality of Privileged Access Management (PAM) is:
Ignoring a risk and continuing business operations is known as:
TCP and UDP reside at which layer of the OSI model?
Four main components of Incident Response are:
Derrick logs on to a system in order to read a file. In this example, Derrick is the ______?
IDS can be described in terms of what fundamental functional components?
What drove the introduction of IPv6?
Protection against an individual falsely denying having performed a particular action.
Which authentication enables automatic identification across multiple service providers?
Permitting authorized access while preventing improper disclosure.
Walmart has a large e-commerce presence worldwide. Which solution would ensure the LOWEST possible latency for customers using their services?
A popular way of implementing the principle of least privilege is:
Which of the following is an endpoint?
What is the purpose of immediate response procedures in a BCP?
COVID-19 is an example where which plan sustains business?
A scam where a malicious website is made to look exactly like a trusted site is called:
What is the primary factor in the reliability of information and systems?
A company analyzes system requirements, functions, and interdependencies to prioritize contingency needs. What is this process called?
Which OSI layer associates MAC addresses with network devices?
Which scenario best represents defense in depth?
Which approach involves a continuous cycle of identifying, assessing, prioritizing, and mitigating cybersecurity risks?
Why is the recovery of IT often crucial to the recovery and sustainment of business operations?
Which type of attack takes advantage of vulnerabilities in validation?
Which IR phase involves identifying critical data and systems?
A CISO documents a policy establishing acceptable cloud use for all staff. This is an example of:
In cybersecurity, typical threat actors include:
An external entity has tried to gain access to your organization’s IT environment without authorization. This is an example of a(n):
Removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset. Microsegmentation of workloads is a tool of the model.
Which encryption type is used in HTTPS communication?
Created by switches to logically segment a network without changing physical topology:
David is worried about distributed denial-of-service (DDoS) attacks against his company’s primary web application. Which option will provide the MOST resilience against large-scale DDoS attacks?
Exhibit.
information security is not built on which of the following?
What is the benefit of subnetting?
System capabilities designed to detect and prevent unauthorized use and transmission of information are known as:
What is the main purpose of creating a baseline for system integrity?
A previously unknown vulnerability with no public listing is called:
Which of the following best describes a zero-day vulnerability?
Which access control model can grant access to a given object based on complex rules?
The practice of sending fraudulent communications that appear to come from a reputable source is known as:
What is an IPSec replay attack?
Which is NOT a possible model for an Incident Response Team (IRT)?
Which of the following properties is NOT guaranteed by digital signatures?
In which phase of an incident response plan are incidents prioritized?
What is the purpose of a Business Impact Analysis (BIA)?
Which of these components is very likely to be instrumental to any disaster recovery (DR) effort?
The DevOps team has updated the application source code. Tom discovered that many unauthorized changes have been made. What is the BEST control Tom can implement to prevent a recurrence of this problem?
Which type of authentication issomething which you know?
Why is security training important?
Which OSI layer does a VPN primarily operate at?
A DLP solution should be deployed so it can inspect all forms of data leaving the organization, including:
What is privacy in the context of Information Security?
Embedded systems and network-enabled devices that communicate with the Internet are considered:
During an ISC2 CC exam, you observe another candidate cheating. What should you do?
What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?
The means by which a threat actor carries out their objectives.
A company experiences a major IT outage and cannot perform critical business functions. Which plan helps recovery?
Critical business functions are disrupted due to a system outage. Which plan sustains operations?
According to ISC2 Code of Ethics, to whom does Kristal ultimately report?
Which penetration testing technique requires the team to do the MOST work and effort?
What doescriticalityrepresent?
Which access control method uses attributes and rules evaluated by a central Policy Decision Point (PDP)?
What is a security token used to authenticate a user to a web application, typically after they log in?
Which protocol is used for secure email?
A LAN-based attack involving malicious packets sent to the default gateway:
The prevention of authorized access to resources or the delaying of time-critical operations is known as:
The evaluation of security controls to determine whether they are implemented correctly and operating as intended is known as:
Which organization defines Internet protocol standards?