New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Practice Free CC CC - Certified in Cybersecurity Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the ISC CC Exam the most current and reliable questions . To help people study, we've made some of our CC - Certified in Cybersecurity exam materials available for free to everyone. You can take the Free CC Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

Exhibit.

CC question answer

What is the PRIMARY purpose of a web application firewall (WAF)?

A.

To protect the web server from DDoS attacks

B.

To monitor network traffic for intrusions

C.

To filter and block malicious web traffic and requests

D.

To manage SSL certificates

Question # 7

In information systems terms, the activities necessary to restore IT and communications services of an organization during and after an outage

A.

IR

B.

BC

C.

Risk Management

D.

DR

Question # 8

What is the process of verifying a users identity called?

A.

Confidentiality

B.

Autentication

C.

Authorization

D.

Identification

Question # 9

Which OSI layer VPN works

A.

Layer 5

B.

Layer 6

C.

Layer 1

D.

Layer 3

Question # 10

Is the right of an individual to control the distribution of information about themselves

A.

Confidentiality

B.

Integrity

C.

Privacy

D.

Availability

Question # 11

Access control used in in high-security situations such as military and government organizations.

A.

DAC

B.

MAC

C.

RBAC

D.

ABAC

Question # 12

Mark has purchased a MAC LAPTOP. He is scared of losing his screen and planning to buy an insurance policy. So, which risk management strategy is?

A.

Risk acceptance

B.

Risk deterrence

C.

Risk transference

D.

Risk mitigation

Question # 13

Government can imposes financial penalties as a consequence of breaking a

A.

Standard

B.

Regulation

C.

Policy

D.

Procedures

Question # 14

Sending employees to work at a customer's home can open your business to more risk of bodily injury or property damage claims. So, to reduce risk and avoid potential losses, you decide not to offer those kinds of services

A.

Risk Acceptance

B.

Risk Assessment

C.

Risk Avoidance

D.

Risk Control

Question # 15

The process of running a simulated instances of a computer system in a layer abstracted from the underlying hardware server or workstation

A.

Containerization

B.

Simulation

C.

Emulation

D.

Virtualization

Question # 16

Which of the following is not a protocol of the OSI layer 3

A.

IGMP

B.

IP

C.

ICMP

D.

SSH

Question # 17

Which TLS extension is used to optimize the TLS handshake process by reducing the number of round trips between the client and server?

A.

TLS Renegotiation

B.

TLS Heartbeat

C.

TLS Session Resumption

D.

TLS FastTrack

Question # 18

Ping flood attack target which OSI layer

A.

Layer 4

B.

Layer 3

C.

Layer 5

D.

Layer 6

Question # 19

The mitigation of violations of security policies and recommended practices

A.

DR

B.

IR

C.

Threat hunting

D.

Incident response

Question # 20

What is the primary goal of the incident management team in the organization

A.

Reduce the impact and resore services

B.

Gathering and analyzing information

C.

Conducting Leason learn meeting

D.

RCA of the impact

Question # 21

Granting a user access to services or the system

A.

Authentication

B.

Identification

C.

Authorization

D.

Confidentiality

Question # 22

Centralized organizational function fulfilled by an information security team that monitors, detects and analyzes events on the network or system to prevent and resolve issues before they result in business disruptions.

A.

IRP

B.

BCP

C.

SOC

D.

DRP

Question # 23

What does the term "Two-factor authentication" refer to in Cybersecurity?

A.

Using two different antivirus programs

B.

Verifying identity with two independent factors

C.

Accessing two different networks simultaneously

D.

Changing passwords every two weeks

Question # 24

Which of the following is NOT one of the four typical ways of managing risk?

A.

Accept

B.

Avoid

C.

Mitigate

D.

Monitor

Question # 25

Risk tolerance also known as

A.

Risk threshold

B.

Risk appetite

C.

Acceptable risk

D.

AII

Question # 26

Which type of control is used to identify that an attack has occurred or is currently occurring

A.

Preventive control

B.

Detective control

C.

Corrective control

D.

Recovery control

Question # 27

Port scanning attack target which OSI layer

A.

Layer 4

B.

Layer 3

C.

Layer 5

D.

Layer 6

Question # 28

What is the primary goal of incident management

A.

To potect life health and safety

B.

To reduce the impacrt of an incident

C.

To prepare for any incident

D.

To resume interrupted operations as soon as possible

Question # 29

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n)

A.

Exploit

B.

Intrusion

C.

Event

D.

Malware

Question # 30

What security feature used in HTTPS

A.

IPSec

B.

SSH

C.

ICMP

D.

SSL/TLS

Question # 31

Is a way to prevent unwanted devices from connecting to a network.

A.

DMZ

B.

VPN

C.

VLAN

D.

NAC

Question # 32

What does the term business in business continuity planning refer to?

A.

The financial performance of the organization

B.

The technical systems of the organization

C.

The operation aspects of the organization

D.

The physical infrastructure of the organization

Question # 33

What is the most important aspect of security awareness/training?

A.

Maximizing business capabilities

B.

Protecting assets

C.

Protecting health and human safety

D.

Ensuring the confidentiality of data

Question # 34

In the context of cybersecurity, typical threat actors include the following:

A.

Insiders (either deliberately, by simple human error, or by gross incompetence).

B.

Outside individuals or informal groups (either planned or opportunistic, discovering vulnerability).

C.

Technology (such as free-running bots and artificial intelligence

D.

All

Question # 35

Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information

A.

Risk Management

B.

Risk Assessment

C.

Risk Mitigation

D.

Adequate Security

Question # 36

Dani is an ISC2 member and an employee of New Corporation. One of Dani's colleagues offers to share a file that contains an illicit copy of a newly released movie. What should Dani do

A.

Inform ISC2

B.

Inform law enforcement

C.

Accept the movie

D.

Refuse to accept

Question # 37

What should been done to limit the damage caused by the ransomware attack

A.

Use a different email client to prevent malicious attachments

B.

Add more Administrative users to the Domain Admins group

C.

Delete all emails with attachments

D.

Limit the use of administrative privileges to only when required

Question # 38

Some Employee of his organization launched a privilege escalation attack to gain root access on one of the organization's database serversiThe employee does have an authorized user account on the server. What log file would be MOST likely to contain relevant information??

A.

Database application log

B.

Firewall log

C.

Operating system log

D.

IDS log

Question # 39

What kind of control is, when we add a backup firewall that takes over if the main one stops working?

A.

Clustering

B.

High availability(HA)

C.

Load balancing

D.

Component redundancy

Question # 40

Exhibit.

CC question answer

information security is not built on which of the following?

A.

Confidentiality

B.

Availability

C.

Accessibility

D.

Integrity

Question # 41

Faking the sending address of a transmission to gain illegal entry into a secure system.

A.

Phishing

B.

ARP

C.

Spoofing

D.

ALL

Question # 42

Which of the following protocols is a secure alternative to using telnet?

A.

SSH

B.

HTTPS

C.

SFTP

D.

LDAPS

Question # 43

When is the Business Continuity Plan Enacted?

A.

When there is a event

B.

When there is a incident

C.

When there is a loss of business operations

D.

When there is a natural disaster

Question # 44

Selvaa presents a userid and a password to a system in order to log on. Which of the following characteristics must the userid have?

A.

Autherization

B.

Authentication

C.

Availability

D.

Identification

Question # 45

What are the primary responsibilities of a computer incident response team (CIRT) during an incident?

A.

To determine the difference between minor and major incident

B.

To troubleshoot network and system issues

C.

To provide medical assistance at accident scenes

D.

To asses the amount and scope of damage caused by the incident

Question # 46

EKristal is the security administrator for a large online service provider. Kristal learns that the company is harvesting personal data of its customers and sharing the data with local governments where the company operates, without the knowledge of the users, to allow the governments to persecute users on the basis of their political and philosophical beliefs. The published user agreement states that the company will not share personal user data with any entities without the users' explicit permission. According to the ISC2 Code of Ethics, to whom does Kristal ultimately report in this situation?

A.

The company Kristal works for

B.

The governments of the countries where the company operates

C.

ISC2

D.

The users

Question # 47

What is the range of well known ports

A.

0 - 1023

B.

1023-49151

C.

49152 - 65535

D.

None

Question # 48

Incident management is also known as

A.

Risk Management

B.

Business Continuity management

C.

Incident management

D.

Crisis management

Question # 49

Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

A.

Brute-force attack

B.

Dictionary attack

C.

Social engineering attack

D.

Replay attack

Question # 50

Which ensure maintaining business operations during or after an incident

A.

Incident Response

B.

Business Continuity

C.

Disaster Recovery

D.

AII

Question # 51

Communication between end systems is encrypted using a key, often known as________?

A.

Temporary Key

B.

Section Key

C.

Public Key

D.

Session Key

Question # 52

What is the main challenge in achieving non repudiation in electronic transactions

A.

Ensuring the identity of the sender and recipient is verified

B.

Ensuring the authenticity and integrity of the message

C.

Making sure the message is not tampered with during transmission

D.

All of the above

Question # 53

A Company IT system experienced a system crash that result in a loss of data. What term best describes this event?

A.

Breach

B.

Incident

C.

Event

D.

Adverse Event

Question # 54

A organization's security system which involves in preventing, detecting, analyzing, and responding to cybersecurity incidents.

A.

Business continuity team

B.

Disaster recovery team

C.

Incident response team

D.

Security operations center

Question # 55

Which version of TLS is considered to be the most secure and recommended for use?

A.

TLS 1.0

B.

TLS 1.1

C.

TLS 1.2

D.

TLS 1.3

Question # 56

What is the purpose of defense in depth in information security

A.

To Implement only technical controls to prevent a cyber attack

B.

To provide unrestricted access to organization assets

C.

To establish variable barriers across multiple layers and mission of the organization

D.

To guarantee that a cyber attack will not occur

Question # 57

What is the recommended fire suppression system for server rooms

A.

Foam based

B.

Water based

C.

Powder based

D.

ftac hacorl

Question # 58

Uses multiple types of access controls in literal or theoretical

layers to help an organization avoid a monolithic security

A.

DMZ

B.

VLAN

C.

Defence in Depth

D.

VPN

Question # 59

Structured way to align IT with business goals while managing risks and meeting all industry and government regulations

A.

GRC

B.

Policies

C.

Law

D.

Stanfard

Question # 60

What is the primary goal of implementing input validation in application security?

A.

To ensure all inputs are stored in a secure database

B.

To prevent unauthorized access to the application

C.

To validate and sanitize user inputs to prevent code injection attacks (Correct)

D.

To encrypt sensitive data transmitted between the client and server

Question # 61

What is the main purpose of using digital signatures in communication security?

A.

To encrypt sensitive data during transmission

B.

To verify the identity of the sender and ensure the integrity of the message (Correct)

C.

To prevent unauthorized access to a network

D.

To compress data to reduce bandwidth usage

Question # 62

Timiting access to resources based on the sensitivity of the information that the resource contains and the authorization of the user to access information with that level of sensitivity.

A.

DAC

B.

MAC

C.

RuBAC

D.

RBAC

Question # 63

Which is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary's attack lifecycle and the platforms they are known to target

A.

MITRE ATT&CK

B.

CVE

C.

Risk Management framework

D.

Security Management

Question # 64

Which layer of OSI the Firewall works

A.

Layer 3

B.

Layer 4

C.

Layer 7

D.

AII

Question # 65

Which security control mostly used to prevent data breach

A.

Physical control

B.

Logical Control

C.

Adminstrative Control

D.

RBAC

Question # 66

Which type of authentication is something which you

A.

Type1

B.

Type 2

C.

Type 3

D.

Type 4

Question # 67

Which layer does VLAN hopping belong to?

A.

Layer 3

B.

Layer 4

C.

Layer 7

D.

Layer 2

Question # 68

Which maintains that a user or entity should only have access to the spec data, resources and applications needed to complete a required task.

A.

Zero Trust

B.

Defence in Depth

C.

Least Privileges

D.

AII

Question # 69

What is an incident in the context of cybersecurity

A.

Any observable occurrence in a network or system

B.

A deliberate security incident in which an intruder gains access to a system or system resource without authorization

C.

A particular attack that exploits system vulnerabilities

D.

An event that actually or potentially jeopardizes the confidentiality integrity or availability of an information system.

Question # 70

Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?

A.

Non-repudiation

B.

Integrity

C.

Availability

D.

Confidentiality

Question # 71

Derrick logs on to a system in order to read a file. In this example. Derrick is the______?

A.

Subject

B.

Object

C.

Process

D.

Predicate

Question # 72

Which of the following is the least secure communications protocol?

A.

CHAP

B.

Ipsec

C.

PAP

D.

EAP

Question # 73

What is the main purpose of creating baseline in ensuring system integrity

A.

To compare the baseline with the current state of the systems

B.

To protect the information

C.

To understand the current state of the system

D.

AII

Question # 74

Which type of attack attempts to gain information by observing the devices power consumption

A.

DOS

B.

Side Channles

C.

XSS

D.

XSRF

Question # 75

Can be considered to be a fingerprint of the file or message

A.

Hashing .

B.

encryption

C.

decryption

D.

encoding

Question # 76

Which type of database combines related records and fields into a logical tree structure?

A.

Relational

B.

Hierarchical

C.

Object-oriented

D.

Network

Question # 77

Which Prevents Threat

A.

Antivirus

B.

IDS

C.

SIEM

D.

HIDS

Question # 78

The amount of risk, at a broad level, that an organization is

willing to accept in pursuit of its strategic objectives.

A.

Risk Assessment

B.

Risk Transfer

C.

Risk Appetite

D.

Risk Management

Question # 79

Which of the following is a subject?

A.

file

B.

fence

C.

filename

D.

user

Question # 80

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called______

A.

Malware

B.

Zero-day

C.

Event

D.

Attack

Question # 81

How does IPSec protect against reply attacks

A.

By using sequence numbers

B.

By limiting access to the network

C.

By using digital signatures

D.

By encryption all network traffic

Question # 82

Are a measure of an organization's baseline of security performance

A.

Security Assessment

B.

Secuirty Audit

C.

Security Benchmark

D.

Security Management

Question # 83

Which of the following physical controls is used to protect against eavesdropping and data theft through electromagnetic radiation

A.

EMI Shielding

B.

Screening rooms

C.

White noise generators

D.

ALL

Question # 84

Actions, processes and tools for ensuring an organization can continue critical operations during a contingency.

A.

BC

B.

DR

C.

IR

D.

AII

Question # 85

When the ISC2 Mail server sends mail to other mail servers it becomes —?

A.

SMTP Server

B.

SMTP Peer

C.

SMTP Master

D.

SMTP Client

Question # 86

A company primary data center goes down due to a hardware failure causing a major disruption to the IT and communications systems. What is the focus of disaster recovery planning in this scenario

A.

Maintaining critical business functions during the disruption

B.

Fixing the hardware failure

C.

Restoring IT and communications back to full operations after the disruptions

D.

Guiding the actions of emergency response personnel during the disruption

Question # 87

Which of the following is NOT one of the three main components of a sql database?

A.

Views

B.

Schemas

C.

Tables

D.

Object-oriented interfaces

Question # 88

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which one of the following controls would BEST achieve his objective?

A.

URL Filter

B.

IP Address Block

C.

DLP Solution

D.

IPS Solution

Question # 89

Who should participate in creating a BCP

A.

Only members from the IT department

B.

Only members from the management team

C.

Members from across the organization

D.

Only members from the finanace department

Question # 90

Created by switches to logically segment a network without altering its physical topology.

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Question # 91

In what way do a victim's files get affected by ransomware?

A.

By destroying them

B.

By encrypting them

C.

By stealing them

D.

By selling them

Question # 92

Which type of application can intercept sensitive information such as passwords on a network segment?

A.

Log server

B.

Network Scanner

C.

Firewall

D.

Protocol Analyzer

Question # 93

provide integrity services that allow a recipient to verify that a message has not been altered.

A.

Hashing

B.

encryption

C.

decryption

D.

encoding

Question # 94

The testing or evaluation of security controls to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for an information system or organization.

A.

Security Assessment

B.

Risk Assessment

C.

DRP

D.

IRP

Question # 95

What is the first step in incident response planning

A.

Develop a policy approved by management

B.

Identify critical data and systems

C.

Train staff on incident response

D.

implement an incident response team

Question # 96

What is the potential impact of an IPSec reply attack

A.

Modification of network traffic

B.

Disruption of network communication

C.

Unauthorized access to network resources

D.

ALL

Question # 97

What is multi-factor authentication (MFA)?

A.

A type of authentication that uses only one method

B.

A type of authentication that uses only two methods

C.

A type of authentication that uses more than two methods (Correct)

D.

A type of authentication that uses only one factor

Question # 98

Which of the following documents contains elements that are NOT mandatory

A.

Procedures

B.

Policies

C.

Regulations

D.

Guidelines

Question # 99

The method of distributing network traffic equally across a pool of resources that support an application

A.

Vlan

B.

DNS

C.

VPN

D.

Load Balancing

Question # 100

Ignoring the risk and proceeding the business operations

A.

Risk Acceptance

B.

Risk Mitigation

C.

Risk Avoidance

D.

Risk Transfer

Question # 101

Which of the following security controls is designed to prevent unauthorized access to sensitive information by ensuring that it is only accessible to authorized users?

A.

Encryption

B.

Firewall

C.

Antivirus

D.

Access control

Question # 102

After an Earthquake disrupting business operations, which documents contains the reactive procedures required to return business to normal operations

A.

The Business Impact Analysis

B.

The Business Continuity Plan

C.

The Disaster Recovery plan

D.

The Business Impact Plan

Question # 103

The Bell and LaPadula access control model is a form of

A.

RBAC

B.

MAC

C.

DAC

D.

ABAC

Question # 104

Which of these is the most efficient and effective way to test a business continuity plan

A.

Simulations

B.

Discussions

C.

Walkthroughs

D.

Reviews

Question # 105

Removing the design belief that the network has any trusted space. Security is managed at eachpossible level, representing the most granular asset. Micro segmentation of workloads is a tool of the model.

A.

Zero Trust

B.

DMZ

C.

VLAN

D.

Micro Segmentation

Question # 106

Natalia is concerned that users on her network may be storing sensitive information, such as social security numbers, on their hard drives without proper authorization or security controls. What 3rd -party security service can she implement to best detect this activity?

A.

IDS - Intrusion Detection System

B.

IPS - Intrusion Prevention System

C.

DLP - Data Loss Protection

D.

TLS - Transport Layer Security

Question # 107

You experienced a power outage that disrupted access to your data center. What type of security concern occurred?

A.

Availability

B.

Confidentiality

C.

Non-Repudiation

D.

Integrity

Question # 108

A hacker gains access to a compony network and begins to intercept network traffic in order to steal login credentials which OSI layer is being attacked

A.

Data Link layer

B.

Physical layer

C.

Network Layer

D.

Application laver

Question # 109

An unknown person obtaining access to the company file system without authorization is example of

A.

Intrusion

B.

Breach

C.

Exploit

D.

Incident

Question # 110

A company data center has been breached by hackers and all its systems have been taken down what is the main objective of the DRP in such a scenario?

A.

To relocate the data center to another location

B.

To ensure the physical safety of employees in the data center

C.

To investigate and prosecute the hackers responsible of the attack

D.

To restore the IT systems to their last known state

Question # 111

Faking the sender address in a transmission to gain illegal entry into a secure system

A.

Phishing

B.

ARP

C.

Spoofing

D.

ALL

Question # 112

Which is the loopback address

A.

::1

B.

127.0.0.1

C.

255.255.255.0

D.

Both A and B

Question # 113

The practice of ensuring that an organizational process cannot be completed by a single person; forces collusion as a means to reduce insider threats.

A.

Segregation of Duties

B.

Principle of Least Privilege

C.

Privileged Account

D.

Rule-based access control

Question # 114

Which of the following attacks can TLS help mitigate?

A.

Cross-site Scripting (XSS) Attacks

B.

Social Engineering Attacks

C.

Man-in-the-middle (MiTm) Attacks (Correct)

D.

SQL Injection Attacks

Question # 115

Which of these activities is often associated with DR efforts?

A.

Running anti-malware solutions

B.

Scanning the IT environment for vulnerabilities

C.

Zero-day exploits

D.

Employees returning to the primary production location

Question # 116

Which device is used to control traffic flow in network

A.

SDN

B.

Switch

C.

Hub

D.

Router

Question # 117

which is the short form of IPv6 address 2001:0db8:0000:0000:0000:ffff:0000:0001

A.

2001:db8::ffff:0:1

B.

2001:db8:0000:ffff:0:1

C.

2001:db80::ffff:0000:1

D.

2001:db8::ffff:0000:0001

Question # 118

Which is strongly used for Securing Wi-Fi

A.

WPA2

B.

WEP

C.

WPA

D.

SSL

Question # 119

Which is not the function of IPS

A.

To encrypt network traffic

B.

To monitor network traffic

C.

To filter network traffic

D.

To detect and prevent attacks

Question # 120

Port forwarding is also known as

A.

Port mapping

B.

Tunneling

C.

Punch through

D.

ALL

Question # 121

The prevention of authorized access to resources or the delaying of time critical operations.

A.

ARP Poisoning

B.

Syn Flood

C.

Denial-of-Service (DoS)

D.

AII

Question # 122

Example of Deterrent controls

A.

CCTV

B.

BCP

C.

DRP

D.

IRP

CC PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CC PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: CC - Certified in Cybersecurity
  • Last Update: Dec 15, 2025
  • Questions and Answers: 407
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CC Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included