Spring Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

CC Sample Questions Answers

Questions 4

What is the primary goal of input validation?

Options:

A.

Secure storage

B.

Prevent unauthorized access

C.

Prevent code injection attacks

D.

Encrypt data

Buy Now
Questions 5

Which of the following is NOT a protocol of OSI Layer 3?

Options:

A.

IGMP

B.

IP

C.

ICMP

D.

SSH

Buy Now
Questions 6

An agreement between a cloud service provider and a customer based on cloud-specific terms is called:

Options:

A.

Memorandum of Understanding

B.

Memorandum of Agreement

C.

Service Level Agreement (SLA)

D.

All

Buy Now
Questions 7

Which plan provides immediate response procedures and management guidance?

Options:

A.

BCP

B.

IRP

C.

DRP

D.

All

Buy Now
Questions 8

Firewalls operate at which OSI layers?

Options:

A.

Layer 3

B.

Layer 4

C.

Layer 7

D.

All

Buy Now
Questions 9

A backup is which type of security control?

Options:

A.

Preventive

B.

Deterrent

C.

Recovery

D.

Corrective

Buy Now
Questions 10

During an ISC2 CC exam, you observe another candidate cheating. What should you do?

Options:

A.

Yell at them

B.

Do nothing

C.

Report the candidate to ISC2

D.

Call law enforcement

Buy Now
Questions 11

An employee launched a privilege escalation attack to gain root access on one of the organization’s database servers. The employee has an authorized user account on the server. What log file would MOST likely contain relevant information?

Options:

A.

Database application log

B.

Firewall log

C.

Operating system log

D.

IDS log

Buy Now
Questions 12

What is the primary goal of Identity and Access Management (IAM) in cybersecurity?

Options:

A.

To ensure 100% security against all threats

B.

To provide secure and controlled access to resources

C.

To eliminate the need for user authentication

D.

To monitor network traffic for performance optimization

Buy Now
Questions 13

Exhibit.

What is the purpose of a Security Information and Event Management (SIEM) system?

Options:

A.

Encrypting files

B.

Monitoring and analyzing security events -

C.

Blocking malicious websites

D.

Managing user passwords

Buy Now
Questions 14

What kind of control is it when we add a backup firewall that takes over if the main one stops working?

Options:

A.

Clustering

B.

High availability (HA)

C.

Load balancing

D.

Component redundancy

Buy Now
Questions 15

Faking the sender address to gain unauthorized access is known as:

Options:

A.

Phishing

B.

ARP

C.

Spoofing

D.

All

Buy Now
Questions 16

Example of a technical control:

Options:

A.

Security guard

B.

GPS installed in a vehicle to track location

C.

Door lock

D.

None

Buy Now
Questions 17

A structured way to align IT with business goals while managing risk and regulations:

Options:

A.

GRC

B.

Policies

C.

Law

D.

Standard

Buy Now
Questions 18

XenServer, LVM, Hyper-V, and ESXi are:

Options:

A.

Type 2 hypervisors

B.

Type 1 hypervisors

C.

Both

D.

None

Buy Now
Questions 19

Which provides confidentiality by hiding or obscuring a message so it cannot be understood by unauthorized parties?

Options:

A.

Hashing

B.

Encoding

C.

Cryptography

D.

All

Buy Now
Questions 20

A measure of the degree to which an organization depends on information or systems to achieve its mission is called:

Options:

A.

Availability

B.

Criticality

C.

Authorization

D.

Confidentiality

Buy Now
Questions 21

The last phase in the data security lifecycle is:

Options:

A.

Encryption

B.

Destruction

C.

Archival

D.

Backup

Buy Now
Questions 22

The evaluation of security controls to determine whether they are implemented correctly and operating as intended is known as:

Options:

A.

Security assessment

B.

Risk assessment

C.

DRP

D.

IRP

Buy Now
Questions 23

After an earthquake disrupts business operations, which document contains the reactive procedures required to return business to normal operations?

Options:

A.

Business Impact Analysis

B.

Business Continuity Plan

C.

Disaster Recovery Plan

D.

Business Impact Plan

Buy Now
Questions 24

Type 1 authentication poses which risks?

Options:

A.

Users may share their credentials with others

B.

Users may forget their passwords

C.

Passwords may be intercepted and stolen

D.

All

Buy Now
Questions 25

Which is NOT a component of a Business Continuity (BC) plan?

Options:

A.

Immediate response procedures

B.

Notification systems

C.

Management authority guidance

D.

Management

Buy Now
Questions 26

The harmonization of automated computing tasks into reusable workflows is called:

Options:

A.

Cloud orchestration

B.

Cloud manager

C.

Cloud broker

D.

Cloud controller

Buy Now
Questions 27

Limiting access based on data sensitivity and user authorization is known as:

Options:

A.

DAC

B.

MAC

C.

RuBAC

D.

RBAC

Buy Now
Questions 28

How does IPSec protect against replay attacks?

Options:

A.

By using sequence numbers

B.

By limiting network access

C.

By using digital signatures

D.

By encrypting all traffic

Buy Now
Questions 29

Which term describes a communication tunnel that provides point-to-point transmission of authentication and data traffic over an untrusted network?

Options:

A.

Zero Trust

B.

DMZ

C.

VPN

D.

None of the above

Buy Now
Questions 30

Which OSI layer is the primary target of a buffer overflow attack?

Options:

A.

Layer 7

B.

Layer 3

C.

Layer 5

D.

Layer 4

Buy Now
Questions 31

Exhibit.

How many keys would be required to support 50 users in an asymmetric cryptography system?

Options:

A.

100

B.

200

C.

50

D.

1225

Buy Now
Questions 32

To avoid bodily injury claims, a company decides not to offer high-risk services. This is an example of:

Options:

A.

Risk Acceptance

B.

Risk Assessment

C.

Risk Avoidance

D.

Risk Control

Buy Now
Questions 33

Which of these components is very likely to be instrumental to any disaster recovery (DR) effort?

Options:

A.

Routers

B.

Laptops

C.

Firewalls

D.

Backups

Buy Now
Questions 34

What is multi-factor authentication (MFA)?

Options:

A.

A type of authentication that uses only one method

B.

A type of authentication that uses only two methods

C.

A type of authentication that uses more than two methods

D.

A type of authentication that uses only one factor

Buy Now
Questions 35

Which logical control best protects confidential data from unauthorized access?

Options:

A.

Encryption

B.

Firewall

C.

Antivirus

D.

Hashing

Buy Now
Questions 36

A weighted factor based on the probability that a threat will exploit a vulnerability is called:

Options:

A.

Likelihood of occurrence

B.

Threat vector

C.

Risk

D.

Impact

Buy Now
Questions 37

What security feature is used in HTTPS?

Options:

A.

IPSec

B.

SSH

C.

ICMP

D.

SSL/TLS

Buy Now
Questions 38

A collection of actions that must be followed to complete a task or process in accordance with a set of rules is known as:

Options:

A.

Policy

B.

Procedure

C.

Law

D.

Standard

Buy Now
Questions 39

A measure combining impact and likelihood is known as:

Options:

A.

Impact

B.

Risk

C.

Threat

D.

Threat vector

Buy Now
Questions 40

Which security measure helps prevent Cross-Site Scripting (XSS) attacks?

Options:

A.

Strong password policies

B.

Firewall blocking

C.

Validating and sanitizing user input

D.

Encrypting data

Buy Now
Questions 41

Which of the following is NOT an element of system security configuration management?

Options:

A.

Baselines

B.

Updates

C.

Inventory

D.

Audit logs

Buy Now
Questions 42

Networks that are heavily microsegmented with firewalls at connection points are characteristic of:

Options:

A.

DMZ

B.

VPN

C.

VLAN

D.

Zero Trust

Buy Now
Questions 43

When the ISC2 mail server sends mail to other mail servers, it becomes a —?

Options:

A.

SMTP Server

B.

SMTP Peer

C.

SMTP Master

D.

SMTP Client

Buy Now
Questions 44

What is the potential impact of an IPSec replay attack?

Options:

A.

Modification of network traffic

B.

Disruption of network communication

C.

Unauthorized access to network resources

D.

All

Buy Now
Questions 45

In Mandatory Access Control (MAC), which statement is true?

Options:

A.

Users access data based on need-to-know

B.

Access controls cannot be changed except by administrators

C.

Data owners modify access

D.

Users control permissions

Buy Now
Questions 46

Exhibit.

What kind of vulnerability is typically not identifiable through a standard vulnerability assessment?

Options:

A.

File permissions

B.

Buffer overflow

C.

Zero-day vulnerability

D.

Cross-site scripting

Buy Now
Questions 47

Which of the following is NOT one of the four typical ways of managing risk?

Options:

A.

Accept

B.

Avoid

C.

Mitigate

D.

Monitor

Buy Now
Questions 48

Which of the following protocols is a secure alternative to using Telnet?

Options:

A.

SSH

B.

HTTPS

C.

SFTP

D.

LDAPS

Buy Now
Questions 49

Which addresses are reserved for internal network use and are not routable on the Internet?

Options:

A.

ac00:: to adff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

B.

fc00:: to fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

C.

bc00:: to bdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

D.

cc00:: to cdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

Buy Now
Questions 50

A common network device used to filter traffic?

Options:

A.

Server

B.

Endpoint

C.

Ethernet

D.

Firewall

Buy Now
Questions 51

Which is a component of a Business Continuity (BC) plan?

Options:

A.

Immediate response procedures

B.

Notification systems and call trees

C.

Management authority guidance

D.

All

Buy Now
Questions 52

What is the main challenge in achieving non-repudiation in electronic transactions?

Options:

A.

Verifying sender and recipient identity

B.

Ensuring message authenticity and integrity

C.

Preventing message tampering

D.

All of the above

Buy Now
Questions 53

Information should be consistently and readily accessible for authorized parties.

Options:

A.

Confidentiality

B.

Authentication

C.

Availability

D.

Non-repudiation

Buy Now
Questions 54

An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant is known as:

Options:

A.

Eavesdropping attack

B.

CSRF

C.

XSS

D.

ARP spoofing

Buy Now
Questions 55

Which document identifies the principles and rules governing an organization’s protection of information systems and data?

Options:

A.

Procedure

B.

Guideline

C.

Policy

D.

Standard

Buy Now
Questions 56

The DevOps team has updated the application source code. Tom discovered that many unauthorized changes have been made. What is the BEST control Tom can implement to prevent a recurrence of this problem?

Options:

A.

Backup

B.

File labels

C.

Security audit

D.

Hashing

Buy Now
Questions 57

Which of the following best describes a zero-day vulnerability?

Options:

A.

A vulnerability that has been identified and patched

B.

A vulnerability that has not yet been discovered or publicly disclosed

C.

A vulnerability exploitable only by experts

D.

A vulnerability that affects only legacy systems

Buy Now
Questions 58

A company wants to ensure that its employees can evacuate the building in case of an emergency. Which physical control is best suited?

Options:

A.

Fire alarms

B.

Exit signs

C.

Emergency lighting

D.

Emergency exit doors

Buy Now
Questions 59

Scans networks to determine connected devices and services:

Options:

A.

Burp Suite

B.

Wireshark

C.

Fiddler

D.

Zenmap

Buy Now
Questions 60

In which phase of an incident response plan are incidents prioritized?

Options:

A.

Post-incident activity

B.

Containment, eradication, and recovery

C.

Detection and analysis

D.

Preparation

Buy Now
Questions 61

A DLP solution should be deployed so it can inspect all forms of data leaving the organization, including:

Options:

A.

Posting to websites

B.

Applications and APIs

C.

Copying to portable media

D.

All

Buy Now
Questions 62

Natalia is concerned that users on her network may be storing sensitive information, such as Social Security numbers, on their hard drives without proper authorization or security controls. What third-party security service can she implement to best detect this activity?

Options:

A.

IDS – Intrusion Detection System

B.

IPS – Intrusion Prevention System

C.

DLP – Data Loss Protection

D.

TLS – Transport Layer Security

Buy Now
Questions 63

The magnitude of harm expected from unauthorized disclosure, modification, destruction, or loss of information is known as:

Options:

A.

Threat

B.

Vulnerability

C.

Impact

D.

Likelihood

Buy Now
Questions 64

Which cloud service model provides the most suitable environment for customers to build and operate their own software?

Options:

A.

SaaS

B.

IaaS

C.

PaaS

Buy Now
Questions 65

Which attack attempts to gain information by observing a device’s power consumption?

Options:

A.

DoS

B.

Side-channel attack

C.

XSS

D.

CSRF

Buy Now
Questions 66

Which protocol is used for secure email?

Options:

A.

POP3S

B.

IMAPS

C.

SMTPS

D.

All

Buy Now
Questions 67

Which document provides a high-level overview of a Disaster Recovery Plan?

Options:

A.

Technical guides

B.

Department-specific plans

C.

Full plan copies for team members

D.

Executive summary

Buy Now
Questions 68

When operating in a cloud environment, which cloud deployment model provides security teams with the greatest access to forensic information?

Options:

A.

FaaS

B.

SaaS

C.

PaaS

D.

IaaS

Buy Now
Questions 69

Which one of the following groups is NOT normally part of an organization's cybersecurity incident response team?

Options:

A.

Technical subject matter experts

B.

Cybersecurity experts

C.

Management

D.

Law enforcement

Buy Now
Questions 70

A method for risk analysis that is based on the assignment of a descriptor such as low, medium, or high.

Options:

A.

Quantitative Risk Analysis

B.

Risk Assessment

C.

Risk Mitigation

D.

Qualitative Risk Analysis

Buy Now
Questions 71

How do you distinguish authentication and identification?

Options:

A.

Both are the same

B.

Authentication verifies identity

C.

Authentication verifies identity; identification claims identity

D.

Identification verifies identity

Buy Now
Questions 72

Which approach involves a continuous cycle of identifying, assessing, prioritizing, and mitigating cybersecurity risks?

Options:

A.

Security assessment

B.

Incident response

C.

Penetration testing

D.

Risk management

Buy Now
Questions 73

Granting a user access to services or a system is known as:

Options:

A.

Authentication

B.

Identification

C.

Authorization

D.

Confidentiality

Buy Now
Questions 74

Restoring IT and communications after a disruption is the goal of:

Options:

A.

BCP

B.

IRP

C.

DRP

D.

None

Buy Now
Questions 75

Which is NOT a possible model for an Incident Response Team (IRT)?

Options:

A.

Leveraged

B.

Dedicated

C.

Hybrid

D.

Outsourced

Buy Now
Questions 76

Often offered by third-party organizations and covering advisory or compliance objectives:

Options:

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or Regulations

Buy Now
Questions 77

What is the range of private (dynamic/ephemeral) ports?

Options:

A.

0 – 1023

B.

1023 – 49151

C.

49152 – 65535

D.

None

Buy Now
Questions 78

Which is the first step in the risk management process?

Options:

A.

Risk response

B.

Risk mitigation

C.

Risk identification

D.

Risk assessment

Buy Now
Questions 79

Which security control is designed to prevent unauthorized access to sensitive information by ensuring it is accessible only to authorized users?

Options:

A.

Encryption

B.

Firewall

C.

Antivirus

D.

Access control

Buy Now
Questions 80

What is the difference between Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)?

Options:

A.

BCP restores IT systems, DRP maintains business functions

B.

DRP restores IT and communications, BCP maintains critical business functions

C.

They are the same

D.

BCP only applies before disasters

Buy Now
Questions 81

Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?

Options:

A.

Non-repudiation

B.

Integrity

C.

Availability

D.

Confidentiality

Buy Now
Questions 82

An attack in which a user authenticated to a server unknowingly invokes unwanted actions after visiting a malicious website is known as:

Options:

A.

XSS

B.

CSRF

C.

Spoofing

D.

ALL

Buy Now
Questions 83

Which is very likely to be used in a Disaster Recovery effort?

Options:

A.

Guard dogs

B.

Contract personnel

C.

Data backups

D.

Anti-malware solutions

Buy Now
Questions 84

Natalia wants to ensure the authenticity of her organization’s domain name records using digital signatures. What technology should she use?

Options:

A.

DNSSIGN

B.

DNSSEC

C.

CERTDNS

D.

DNS2

Buy Now
Questions 85

Which type of authentication issomething which you know?

Options:

A.

Type 1

B.

Type 2

C.

Type 3

D.

Type 4

Buy Now
Questions 86

Which phase of the access control process (AAA) does a user prove his/her identity?

Options:

A.

Authentication

B.

Authorization

C.

Identification

D.

Accounting

Buy Now
Questions 87

A one-way spinning door or barrier that allows only one person at a time to enter a building or area.

Options:

A.

Turnstile

B.

Mantrap

C.

Bollard

D.

Gate

Buy Now
Questions 88

The amount of risk an organization is willing to accept in pursuit of objectives is called:

Options:

A.

Risk assessment

B.

Risk transfer

C.

Risk appetite

D.

Risk management

Buy Now
Questions 89

A curated knowledge base modeling adversary behavior across attack phases is:

Options:

A.

MITRE ATTandCK

B.

CVE

C.

RMF

D.

Security Management

Buy Now
Questions 90

Which device is used to control traffic flow between networks?

Options:

A.

SDN

B.

Switch

C.

Hub

D.

Router

Buy Now
Questions 91

Which layer provides services directly to the user?

Options:

A.

Application Layer

B.

Session Layer

C.

Presentation Layer

D.

Physical Layer

Buy Now
Questions 92

Which type of software testing focuses on examining the source code for vulnerabilities and security issues?

Options:

A.

Black-box testing

B.

White-box testing

C.

Functional testing

D.

User acceptance testing

Buy Now
Questions 93

What is the first step in incident response planning?

Options:

A.

Develop a management-approved policy

B.

Identify critical systems

C.

Train staff

D.

Form the IR team

Buy Now
Questions 94

Which is the loopback address?

Options:

A.

::1

B.

127.0.0.1

C.

255.255.255.0

D.

Both A and B

Buy Now
Questions 95

The primary goal of a risk assessment is to:

Options:

A.

Avoid risk

B.

Estimate and prioritize risk

C.

Ignore risk

D.

Evaluate only the impact

Buy Now
Questions 96

Finance Server and Transaction Server have restored their original facility after a disaster. What should be moved in FIRST?

Options:

A.

Management

B.

Most critical systems

C.

Most critical functions

D.

Least critical functions

Buy Now
Questions 97

The order of controls used in defense in depth:

Options:

A.

Assets → Physical → Administrative → Technical

B.

Assets → Administrative → Physical → Technical

C.

Physical → Administrative → Technical → Assets

D.

Assets → Administrative → Technical → Physical

Buy Now
Questions 98

An analysis of system requirements and interdependencies used to prioritize recovery is known as:

Options:

A.

BIA

B.

DR

C.

BCP

D.

IRP

Buy Now
Questions 99

Token Ring operates at which OSI layer?

Options:

A.

Application

B.

Network

C.

Transport

D.

Physical

Buy Now
Questions 100

Why is identifying roles and responsibilities important in IR planning?

Options:

A.

To prevent incidents

B.

To ensure everyone knows their role

C.

To reduce impact

D.

To select containment strategy

Buy Now
Questions 101

Which activity is often associated with Disaster Recovery efforts?

Options:

A.

Running anti-malware

B.

Vulnerability scanning

C.

Zero-day exploits

D.

Employees returning to the primary production location

Buy Now
Questions 102

Actions, processes, and tools ensuring continuity of critical operations:

Options:

A.

BC

B.

DR

C.

IR

D.

All

Buy Now
Questions 103

An external entity attempts unauthorized access to your IT environment. This is a(n):

Options:

A.

Exploit

B.

Intrusion

C.

Event

D.

Malware

Buy Now
Questions 104

Mark’s proposed configuration change must be approved and tested by a Change Control Board. This is an example of:

Options:

A.

Holistic security

B.

Defense in depth

C.

Threat intelligence

D.

Segregation of duties

Buy Now
Questions 105

What is meant by non-repudiation?

Options:

A.

If a user does something, they can't later claim that they didn't do it.

B.

Controls to protect the organization's reputation from harm due to inappropriate social media postings by employees, even if on their private accounts and personal time.

C.

It is part of the rules set by administrative controls.

D.

It is a security feature that prevents session replay attacks.

Buy Now
Questions 106

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which control would BEST achieve his objective?

Options:

A.

URL Filter

B.

IP Address Block

C.

DLP Solution

D.

IPS Solution

Buy Now
Questions 107

What is the primary goal of network segmentation in cybersecurity?

Options:

A.

To increase network speed

B.

To isolate and protect critical assets

C.

To centralize data storage

D.

To expand network coverage

Buy Now
Questions 108

What does the term “Two-factor authentication” refer to in cybersecurity?

Options:

A.

Using two different antivirus programs

B.

Verifying identity with two independent factors

C.

Accessing two different networks simultaneously

D.

Changing passwords every two weeks

Buy Now
Questions 109

According to ISC2 Code of Ethics, to whom does Kristal ultimately report?

Options:

A.

The company

B.

Governments

C.

ISC2

D.

The users

Buy Now
Questions 110

Which of the following attacks can TLS help mitigate?

Options:

A.

Cross-site Scripting (XSS) attacks

B.

Social engineering attacks

C.

Man-in-the-middle (MITM) attacks

D.

SQL injection attacks

Buy Now
Questions 111

What is the most important aspect of security awareness and training?

Options:

A.

Maximizing business capabilities

B.

Protecting assets

C.

Protecting health and human safety

D.

Ensuring confidentiality of data

Buy Now
Questions 112

Which organization defines Internet protocol standards?

Options:

A.

ISO

B.

NIST

C.

IETF

D.

GDPR

Buy Now
Questions 113

What is the purpose of defense in depth?

Options:

A.

Implement only technical controls

B.

Provide unrestricted access

C.

Establish multiple layered security controls

D.

Guarantee no cyberattacks

Buy Now
Questions 114

A company wants to prevent employees from bringing unauthorized electronic devices into the workspace. Which physical control is best?

Options:

A.

Metal detectors

B.

Security guards

C.

RFID scanners

D.

Baggage X-ray machines

Buy Now
Questions 115

Risk tolerance is also known as:

Options:

A.

Risk threshold

B.

Risk appetite

C.

Acceptable risk

D.

All

Buy Now
Questions 116

What is the purpose of a Business Impact Analysis (BIA)?

Options:

A.

Restore IT services

B.

Mitigate security violations

C.

Provide DRP overview

D.

Analyze system requirements to determine recovery priorities

Buy Now
Questions 117

Which is an example of a deterrent control?

Options:

A.

Biometric

B.

Guard dog

C.

Encryption

D.

Turnstile

Buy Now
Questions 118

A company network experiences a sudden flood of network packets that causes major slowdown in Internet traffic. What type of event is this?

Options:

A.

Security incident

B.

Natural disaster

C.

Exploit

D.

Adverse event

Buy Now
Questions 119

A security event in which an intruder gains or attempts unauthorized access to a system is called:

Options:

A.

Intrusion

B.

Exploit

C.

Threat

D.

Attack

Buy Now
Questions 120

Port scanning attacks target which OSI layer?

Options:

A.

Layer 4

B.

Layer 3

C.

Layer 5

D.

Layer 6

Buy Now
Exam Code: CC
Exam Name: CC - Certified in Cybersecurity
Last Update: Mar 7, 2026
Questions: 403
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now CC