Spring Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Practice Free CC CC - Certified in Cybersecurity Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the ISC CC Exam the most current and reliable questions . To help people study, we've made some of our CC - Certified in Cybersecurity exam materials available for free to everyone. You can take the Free CC Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

A structured approach used to oversee and manage risk for an enterprise is called:

A.

Risk assessment

B.

Risk threshold

C.

Risk Management Framework

D.

Risk appetite

Question # 7

Which of the following attacks can TLS help mitigate?

A.

Cross-site Scripting (XSS) attacks

B.

Social engineering attacks

C.

Man-in-the-middle (MITM) attacks

D.

SQL injection attacks

Question # 8

VLAN hopping belongs to which OSI layer?

A.

Layer 3

B.

Layer 4

C.

Layer 7

D.

Layer 2

Question # 9

How many bits represent the Organizationally Unique Identifier (OUI) in MAC addresses?

A.

16 bits

B.

48 bits

C.

24 bits

D.

32 bits

Question # 10

Security commensurate with risk and magnitude of harm is known as:

A.

Risk management

B.

Risk assessment

C.

Risk mitigation

D.

Adequate security

Question # 11

A set of security controls or system settings used to ensure uniformity of configuration through the IT environment?

A.

Patches

B.

Inventory

C.

Baseline

D.

Policy

Question # 12

In Mandatory Access Control (MAC), which statement is true?

A.

Users access data based on need-to-know

B.

Access controls cannot be changed except by administrators

C.

Data owners modify access

D.

Users control permissions

Question # 13

Example of Type 1 authentication:

A.

Password

B.

Smart card

C.

Fingerprint

D.

RSA token

Question # 14

A DLP solution should be deployed so it can inspect all forms of data leaving the organization, including:

A.

Posting to websites

B.

Applications and APIs

C.

Copying to portable media

D.

All

Question # 15

Port scanning attacks target which OSI layer?

A.

Layer 4

B.

Layer 3

C.

Layer 5

D.

Layer 6

Question # 16

The primary functionality of Privileged Access Management (PAM) is:

A.

Validate access to a file

B.

Prevent unauthorized access to assets

C.

Provide just-in-time access to critical resources

D.

Manage centralized access control

Question # 17

Which is NOT a component of a Business Continuity (BC) plan?

A.

Immediate response procedures

B.

Notification systems

C.

Management authority guidance

D.

Management

Question # 18

A transaction over $50,000 requires approval from both a manager and an accountant. Which concept applies?

A.

MAC

B.

Defense in Depth

C.

Two-Person Integrity

D.

Principle of Least Privilege

Question # 19

The prevention of authorized access to resources or delaying time-critical operations is known as:

A.

DDoS

B.

Authorization

C.

Authentication

D.

Availability

Question # 20

Which is an example of a deterrent control?

A.

Biometric

B.

Guard dog

C.

Encryption

D.

Turnstile

Question # 21

_______ are virtual separations within a switch used mainly to limit broadcast traffic.

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Question # 22

A hacker launches a specific attack to exploit a known vulnerability. This is called:

A.

Breach

B.

Event

C.

Exploit

D.

Intrusion

Question # 23

What is the potential impact of an IPSec replay attack?

A.

Modification of network traffic

B.

Disruption of network communication

C.

Unauthorized access to network resources

D.

All

Question # 24

Which works by encapsulating one packet inside another?

A.

Network segmentation

B.

Load balancing

C.

Tunneling

D.

Data encryption

Question # 25

In DAC, a subject granted access can:

A.

Change security attributes

B.

Choose attributes for new objects

C.

Change access rules

D.

All

Question # 26

Uses multiple types of access controls in layered fashion to avoid monolithic security:

A.

DMZ

B.

VLAN

C.

Defense in Depth

D.

VPN

Question # 27

A method for risk analysis that is based on the assignment of a descriptor such as low, medium, or high.

A.

Quantitative Risk Analysis

B.

Risk Assessment

C.

Risk Mitigation

D.

Qualitative Risk Analysis

Question # 28

A device that forwards traffic to the port of a known destination device is a:

A.

Switch

B.

Hub

C.

Router

D.

Ethernet

Question # 29

What is the main challenge in achieving non-repudiation in electronic transactions?

A.

Verifying sender and recipient identity

B.

Ensuring message authenticity and integrity

C.

Preventing message tampering

D.

All of the above

Question # 30

What is the purpose of the post-incident phase?

A.

Detection and analysis

B.

Preparation

C.

Lessons learned and improvement

D.

Containment and eradication

Question # 31

What federal law requires the use of vulnerability scanning on information systems operated by federal government agencies?

A.

FISMA

B.

HIPAA

C.

GLBA

D.

FERPA

Question # 32

What is the main purpose of digital signatures?

A.

Encrypt data

B.

Verify sender identity and ensure message integrity

C.

Prevent network access

D.

Compress data

Question # 33

David's team recently implemented a new system that gathers information from a variety of different log sources, analyzes that information, and then triggers automated playbooks in response to security events. What term BEST describes this technology?

A.

SIEM

B.

Log Repository

C.

IPS

D.

SOAR

Question # 34

Mark is configuring an automated data transfer between two hosts and needs an authentication method. What approach is best suited?

A.

Biometric

B.

Smart Card

C.

SSH Key

D.

Hard-coded Password

Question # 35

A company network experiences a sudden flood of network packets that causes major slowdown in Internet traffic. What type of event is this?

A.

Security incident

B.

Natural disaster

C.

Exploit

D.

Adverse event

Question # 36

Which zero-trust component breaks LANs into very small, localized security zones?

A.

Zero Trust

B.

DMZ

C.

VPN

D.

Microsegmentation

Question # 37

A popular way of implementing the principle of least privilege is:

A.

MAC

B.

DAC

C.

RBAC

D.

ABAC

Question # 38

Which is strongly used for securing Wi-Fi?

A.

WPA2

B.

WEP

C.

WPA

D.

SSL

Question # 39

Which device is used to control traffic flow between networks?

A.

SDN

B.

Switch

C.

Hub

D.

Router

Question # 40

A measure combining impact and likelihood is known as:

A.

Impact

B.

Risk

C.

Threat

D.

Threat vector

Question # 41

Example of a deterrent control:

A.

CCTV

B.

BCP

C.

DRP

D.

IRP

Question # 42

What is an IP address?

A.

A physical address

B.

A vendor identifier

C.

A logical address associated with a network interface

D.

A hardware address

Question # 43

An event that jeopardizes confidentiality, integrity, or availability is called:

A.

Breach

B.

Event

C.

Incident

D.

Exploit

Question # 44

What is the purpose of a Business Impact Analysis (BIA)?

A.

Restore IT services

B.

Mitigate security violations

C.

Provide DRP overview

D.

Analyze system requirements to determine recovery priorities

Question # 45

Which phase of the access control process (AAA) does a user prove his/her identity?

A.

Authentication

B.

Authorization

C.

Identification

D.

Accounting

Question # 46

Which of the following best describes a zero-day vulnerability?

A.

A vulnerability that has been identified and patched

B.

A vulnerability that has not yet been discovered or publicly disclosed

C.

A vulnerability exploitable only by experts

D.

A vulnerability that affects only legacy systems

Question # 47

Which of the following does NOT normally influence an organization’s log retention policy?

A.

Laws

B.

Corporate governance

C.

Regulations

D.

Audits

Question # 48

Information should be consistently and readily accessible for authorized parties.

A.

Confidentiality

B.

Authentication

C.

Availability

D.

Non-repudiation

Question # 49

Which technology should be implemented to increase the work effort required for buffer overflow attacks?

A.

Address Space Layout Randomization

B.

Memory induction application

C.

Input memory isolation

D.

Read-only memory integrity checks

Question # 50

Removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset. Microsegmentation of workloads is a tool of the model.

A.

Zero Trust

B.

DMZ

C.

VLAN

D.

Microsegmentation

Question # 51

Natalia is concerned that users on her network may be storing sensitive information, such as Social Security numbers, on their hard drives without proper authorization or security controls. What third-party security service can she implement to best detect this activity?

A.

IDS – Intrusion Detection System

B.

IPS – Intrusion Prevention System

C.

DLP – Data Loss Protection

D.

TLS – Transport Layer Security

Question # 52

Mark has purchased a Mac laptop. He is scared of losing his screen and is planning to buy an insurance policy. Which risk management strategy is this?

A.

Risk acceptance

B.

Risk deterrence

C.

Risk transference

D.

Risk mitigation

Question # 53

What does internal consistency of information refer to?

A.

Accurate and complete data

B.

Protection from errors

C.

All data instances being identical

D.

Same display format

Question # 54

What does the termbusinessin business continuity planning refer to?

A.

The financial performance of the organization

B.

The technical systems of the organization

C.

The operational aspects of the organization

D.

The physical infrastructure of the organization

Question # 55

Which principle states that users should have access only to the specific data and resources needed to perform required tasks?

A.

Zero Trust

B.

Defense in Depth

C.

Least Privilege

D.

All

Question # 56

Which prevents threats?

A.

Antivirus

B.

IDS

C.

SIEM

D.

HIDS

Question # 57

An unusual occurrence in a system or network is best described as:

A.

Breach

B.

Exploit

C.

Event

D.

Intrusion

Question # 58

David is worried about distributed denial-of-service (DDoS) attacks against his company’s primary web application. Which option will provide the MOST resilience against large-scale DDoS attacks?

A.

Implement a CDN

B.

Increase the number of servers in the web application cluster

C.

Contract for DDoS mitigation services via the company’s IPS

D.

Increase bandwidth from one or more ISPs

Question # 59

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which control would BEST achieve this objective?

A.

URL filter

B.

IP address block

C.

DLP solution

D.

IPS solution

Question # 60

Exhibit.

CC question answer

What is the purpose of a Security Information and Event Management (SIEM) system?

A.

Encrypting files

B.

Monitoring and analyzing security events -

C.

Blocking malicious websites

D.

Managing user passwords

Question # 61

An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant is known as:

A.

Eavesdropping attack

B.

CSRF

C.

XSS

D.

ARP spoofing

Question # 62

Embedded systems and network-enabled devices that communicate with the Internet are considered:

A.

Endpoint

B.

Node

C.

IoT

D.

Router

Question # 63

Which version of TLS is considered the most secure and recommended for use?

A.

TLS 1.0

B.

TLS 1.1

C.

TLS 1.2

D.

TLS 1.3

Question # 64

What security feature is used in HTTPS?

A.

IPSec

B.

SSH

C.

ICMP

D.

SSL/TLS

Question # 65

The purpose of risk identification is:

A.

Employees at all levels help identify risks

B.

Identify risks to communicate clearly

C.

Identify risks to protect against them

D.

All

Question # 66

The process of applying secure configurations to reduce the attack surface is known as:

A.

Security assessment

B.

Security evaluation

C.

Security benchmark

D.

Security hardening

Question # 67

Which type of application can intercept sensitive information such as passwords on a network segment?

A.

Log server

B.

Network scanner

C.

Firewall

D.

Protocol analyzer

Question # 68

John joined the ISC2 organization. His manager asked him to check the authentication controls in a security module. What would John use to ensure a certain control is working as he expects it to?

A.

Security testing

B.

Security assessment

C.

Security audit

D.

Security walkthrough

Question # 69

What is remanence?

A.

The ability of retaining magnetization in a storage disk after deletion

B.

Files or pieces of files get scattered throughout your disks

C.

Data corruption due to disk failure

D.

All

Question # 70

What is the focus of disaster recovery planning after a data center outage?

A.

Maintaining business functions

B.

Fixing hardware

C.

Restoring IT and communications

D.

Emergency response guidance

Question # 71

Which organization defines Internet protocol standards?

A.

ISO

B.

NIST

C.

IETF

D.

GDPR

Question # 72

Created by switches to logically segment a network without changing physical topology:

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Question # 73

Walmart has a large e-commerce presence worldwide. Which solution would ensure the LOWEST possible latency for customers using their services?

A.

CDN

B.

SaaS

C.

Load balancing

D.

Decentralized data centers

Question # 74

What is the range of well-known ports?

A.

0–1023

B.

1024–49151

C.

49152–65535

D.

None

Question # 75

If a device is found to be non-compliant with the security baseline, what action should the security team take?

A.

Report

B.

Evaluate

C.

Ignore

D.

Disable or isolate it into a quarantine area until it can be checked and updated

Question # 76

Which of the following properties is NOT guaranteed by digital signatures?

A.

Authentication

B.

Confidentiality

C.

Non-repudiation

D.

Integrity

Question # 77

Permitting authorized access while preventing improper disclosure.

A.

Integrity

B.

Confidentiality

C.

Availability

D.

All

Question # 78

Exhibit.

CC question answer

How many keys would be required to support 50 users in an asymmetric cryptography system?

A.

100

B.

200

C.

50

D.

1225

Question # 79

Which one of the following groups is NOT normally part of an organization's cybersecurity incident response team?

A.

Technical subject matter experts

B.

Cybersecurity experts

C.

Management

D.

Law enforcement

Question # 80

The documented set of procedures to detect, respond to, and limit the consequences of cyberattacks is called:

A.

IR

B.

IRP

C.

BCP

D.

DRP

Question # 81

Raj wants aphysical deterrent controlto discourage unauthorized entry. Which option best serves this purpose?

A.

A wall

B.

Razor tape

C.

A sign

D.

A hidden camera

Question # 82

Which of the following is NOT a protocol of OSI Layer 3?

A.

IGMP

B.

IP

C.

ICMP

D.

SSH

Question # 83

In cybersecurity, typical threat actors include:

A.

Insiders (intentional or accidental)

B.

External individuals or groups

C.

Technology (bots, automation, AI)

D.

All

Question # 84

What are registered ports primarily used for?

A.

Core TCP/IP protocols

B.

Web servers

C.

In-house applications

D.

Vendor and proprietary applications

Question # 85

What kind of control is it when we add a backup firewall that takes over if the main one stops working?

A.

Clustering

B.

High availability (HA)

C.

Load balancing

D.

Component redundancy

Question # 86

What is the benefit of subnetting?

A.

By increasing network bandwidth

B.

By improving network security

C.

By reducing network congestion

D.

By simplifying network management

Question # 87

How often should an organization test its BCP?

A.

Continually

B.

Annually

C.

Routinely

D.

Daily

Question # 88

Configuration settings or parameters stored as data and managed through a software graphical user interface (GUI) are examples of:

A.

Logical access control

B.

Physical access control

C.

Administrative access control

Question # 89

What drove the introduction of IPv6?

A.

IPv4 was insecure

B.

IPv4 was incompatible

C.

IPv4 address exhaustion

D.

IPv6 supports Wi-Fi

Question # 90

Which can be considered a fingerprint of a file or message?

A.

Hashing

B.

Encryption

C.

Decryption

D.

Encoding

Question # 91

A ________ creates an encrypted tunnel to protect your personal data and communications.

A.

HTTPS

B.

VPN

C.

Anti-virus

D.

IDS

Question # 92

What is a threat in cybersecurity?

A.

A system weakness

B.

Something to protect

C.

A method of attack

D.

A person or thing that exploits vulnerabilities

Question # 93

What is sensitivity in the context of confidentiality?

A.

Harm caused to external stakeholders

B.

Ability of information to be accessed only by authorized users

C.

Need for protection assigned to information by its owner

D.

Health status of individuals

Question # 94

Are events that may indicate that an organization's systems or data have been compromised or that protective measures have failed.

A.

Exploit

B.

Security incident

C.

Threat

D.

Breach

Question # 95

Which authentication enables automatic identification across multiple service providers?

A.

Basic

B.

Kerberos

C.

Token-based

D.

Federated

Question # 96

Which security control is most commonly used to prevent data breaches?

A.

Physical control

B.

Logical control

C.

Administrative control

D.

RBAC

Question # 97

An attack in which a user authenticated to a server unknowingly invokes unwanted actions after visiting a malicious website is known as:

A.

XSS

B.

CSRF

C.

Spoofing

D.

ALL

Question # 98

Load balancing primarily safeguards which CIA triad element?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

All

Question # 99

The evaluation of security controls to determine whether they are implemented correctly and operating as intended is known as:

A.

Security assessment

B.

Risk assessment

C.

DRP

D.

IRP

Question # 100

Is defined as the process of identifying, estimating, and prioritizing risks.

A.

Risk Assessment

B.

Risk Treatment

C.

Risk Mitigation

D.

Risk Management

Question # 101

Which type of control is used to restore systems or processes to their normal state after an attack?

A.

Compensatory control

B.

Recovery control

C.

Detective control

D.

Corrective control

Question # 102

Representation of data at OSI Layer 3 is called a:

A.

Segment

B.

Packet

C.

Frame

D.

None of the above

Question # 103

Who must follow HIPAA compliance?

A.

Energy sector

B.

Health care

C.

Finance sector

D.

All

Question # 104

What is the primary goal of input validation?

A.

Secure storage

B.

Prevent unauthorized access

C.

Prevent code injection attacks

D.

Encrypt data

Question # 105

What is privacy in the context of Information Security?

A.

Protecting data from unauthorized access

B.

Ensuring data is accurate and unchanged

C.

Making sure data is always accessible when needed

D.

Disclosed without their consent

Question # 106

In which access control model can the creator of an object delegate permissions?

A.

MAC

B.

RBAC

C.

ABAC

D.

DAC

Question # 107

Mark’s proposed configuration change must be approved and tested by a Change Control Board. This is an example of:

A.

Holistic security

B.

Defense in depth

C.

Threat intelligence

D.

Segregation of duties

Question # 108

Which of the following protocols is a secure alternative to using Telnet?

A.

SSH

B.

HTTPS

C.

SFTP

D.

LDAPS

Question # 109

A one-way spinning door or barrier that allows only one person at a time to enter a building or area.

A.

Turnstile

B.

Mantrap

C.

Bollard

D.

Gate

Question # 110

The harmonization of automated computing tasks into reusable workflows is called:

A.

Cloud orchestration

B.

Cloud manager

C.

Cloud broker

D.

Cloud controller

Question # 111

Which attack most effectively maintains remote access and control over a victim’s computer?

A.

Phishing

B.

Trojans

C.

XSS

D.

Rootkits

Question # 112

Security controls protecting against fire, floods, and earthquakes are:

A.

Physical controls

B.

Logical controls

C.

Administrative controls

D.

Technical controls

Question # 113

Often offered by third-party organizations and covering advisory or compliance objectives:

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or Regulations

Question # 114

The method of distributing network traffic equally across a pool of resources is called:

A.

VLAN

B.

DNS

C.

VPN

D.

Load balancing

Question # 115

Configuration settings or parameters stored as data and managed through a GUI are examples of:

A.

Logical access control

B.

Physical access control

C.

Administrative access control

Question # 116

A DDoS attack flooding ICMP packets is called:

A.

DoS

B.

SYN flood

C.

Smurf attack

D.

Phishing

Question # 117

A security event does not affect confidentiality, integrity, or availability. What is it?

A.

Exploit

B.

Breach

C.

Incident

D.

Event

Question # 118

Port used by DNS.

A.

53

B.

80

C.

45

D.

54

Question # 119

Access control used in high-security military and government environments:

A.

DAC

B.

MAC

C.

RBAC

D.

ABAC

Question # 120

An employee unintentionally shares confidential information with an unauthorized party. What term best describes this?

A.

Event

B.

Exploit

C.

Intrusion

D.

Breach

CC PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CC PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: CC - Certified in Cybersecurity
  • Last Update: Feb 24, 2026
  • Questions and Answers: 403
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CC Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included