Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

CC PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CC PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: CC - Certified in Cybersecurity
  • Last Update: Sep 12, 2025
  • Questions and Answers: 407
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CC Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CC Practice Exam Questions with Answers CC - Certified in Cybersecurity Certification

Question # 6

Exhibit.

CC question answer

What is the PRIMARY purpose of a web application firewall (WAF)?

A.

To protect the web server from DDoS attacks

B.

To monitor network traffic for intrusions

C.

To filter and block malicious web traffic and requests

D.

To manage SSL certificates

Full Access
Question # 7

In information systems terms, the activities necessary to restore IT and communications services of an organization during and after an outage

A.

IR

B.

BC

C.

Risk Management

D.

DR

Full Access
Question # 8

What is the process of verifying a users identity called?

A.

Confidentiality

B.

Autentication

C.

Authorization

D.

Identification

Full Access
Question # 9

Which OSI layer VPN works

A.

Layer 5

B.

Layer 6

C.

Layer 1

D.

Layer 3

Full Access
Question # 10

Is the right of an individual to control the distribution of information about themselves

A.

Confidentiality

B.

Integrity

C.

Privacy

D.

Availability

Full Access
Question # 11

Access control used in in high-security situations such as military and government organizations.

A.

DAC

B.

MAC

C.

RBAC

D.

ABAC

Full Access
Question # 12

Mark has purchased a MAC LAPTOP. He is scared of losing his screen and planning to buy an insurance policy. So, which risk management strategy is?

A.

Risk acceptance

B.

Risk deterrence

C.

Risk transference

D.

Risk mitigation

Full Access
Question # 13

Government can imposes financial penalties as a consequence of breaking a

A.

Standard

B.

Regulation

C.

Policy

D.

Procedures

Full Access
Question # 14

Sending employees to work at a customer's home can open your business to more risk of bodily injury or property damage claims. So, to reduce risk and avoid potential losses, you decide not to offer those kinds of services

A.

Risk Acceptance

B.

Risk Assessment

C.

Risk Avoidance

D.

Risk Control

Full Access
Question # 15

The process of running a simulated instances of a computer system in a layer abstracted from the underlying hardware server or workstation

A.

Containerization

B.

Simulation

C.

Emulation

D.

Virtualization

Full Access
Question # 16

Which of the following is not a protocol of the OSI layer 3

A.

IGMP

B.

IP

C.

ICMP

D.

SSH

Full Access
Question # 17

Which TLS extension is used to optimize the TLS handshake process by reducing the number of round trips between the client and server?

A.

TLS Renegotiation

B.

TLS Heartbeat

C.

TLS Session Resumption

D.

TLS FastTrack

Full Access
Question # 18

Ping flood attack target which OSI layer

A.

Layer 4

B.

Layer 3

C.

Layer 5

D.

Layer 6

Full Access
Question # 19

The mitigation of violations of security policies and recommended practices

A.

DR

B.

IR

C.

Threat hunting

D.

Incident response

Full Access
Question # 20

What is the primary goal of the incident management team in the organization

A.

Reduce the impact and resore services

B.

Gathering and analyzing information

C.

Conducting Leason learn meeting

D.

RCA of the impact

Full Access
Question # 21

Granting a user access to services or the system

A.

Authentication

B.

Identification

C.

Authorization

D.

Confidentiality

Full Access
Question # 22

Centralized organizational function fulfilled by an information security team that monitors, detects and analyzes events on the network or system to prevent and resolve issues before they result in business disruptions.

A.

IRP

B.

BCP

C.

SOC

D.

DRP

Full Access
Question # 23

What does the term "Two-factor authentication" refer to in Cybersecurity?

A.

Using two different antivirus programs

B.

Verifying identity with two independent factors

C.

Accessing two different networks simultaneously

D.

Changing passwords every two weeks

Full Access
Question # 24

Which of the following is NOT one of the four typical ways of managing risk?

A.

Accept

B.

Avoid

C.

Mitigate

D.

Monitor

Full Access
Question # 25

Risk tolerance also known as

A.

Risk threshold

B.

Risk appetite

C.

Acceptable risk

D.

AII

Full Access
Question # 26

Which type of control is used to identify that an attack has occurred or is currently occurring

A.

Preventive control

B.

Detective control

C.

Corrective control

D.

Recovery control

Full Access
Question # 27

Port scanning attack target which OSI layer

A.

Layer 4

B.

Layer 3

C.

Layer 5

D.

Layer 6

Full Access
Question # 28

What is the primary goal of incident management

A.

To potect life health and safety

B.

To reduce the impacrt of an incident

C.

To prepare for any incident

D.

To resume interrupted operations as soon as possible

Full Access
Question # 29

An external entity has tried to gain access to your organization's IT environment without proper authorization. This is an example of a(n)

A.

Exploit

B.

Intrusion

C.

Event

D.

Malware

Full Access
Question # 30

What security feature used in HTTPS

A.

IPSec

B.

SSH

C.

ICMP

D.

SSL/TLS

Full Access
Question # 31

Is a way to prevent unwanted devices from connecting to a network.

A.

DMZ

B.

VPN

C.

VLAN

D.

NAC

Full Access
Question # 32

What does the term business in business continuity planning refer to?

A.

The financial performance of the organization

B.

The technical systems of the organization

C.

The operation aspects of the organization

D.

The physical infrastructure of the organization

Full Access
Question # 33

What is the most important aspect of security awareness/training?

A.

Maximizing business capabilities

B.

Protecting assets

C.

Protecting health and human safety

D.

Ensuring the confidentiality of data

Full Access
Question # 34

In the context of cybersecurity, typical threat actors include the following:

A.

Insiders (either deliberately, by simple human error, or by gross incompetence).

B.

Outside individuals or informal groups (either planned or opportunistic, discovering vulnerability).

C.

Technology (such as free-running bots and artificial intelligence

D.

All

Full Access
Question # 35

Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information

A.

Risk Management

B.

Risk Assessment

C.

Risk Mitigation

D.

Adequate Security

Full Access
Question # 36

Dani is an ISC2 member and an employee of New Corporation. One of Dani's colleagues offers to share a file that contains an illicit copy of a newly released movie. What should Dani do

A.

Inform ISC2

B.

Inform law enforcement

C.

Accept the movie

D.

Refuse to accept

Full Access
Question # 37

What should been done to limit the damage caused by the ransomware attack

A.

Use a different email client to prevent malicious attachments

B.

Add more Administrative users to the Domain Admins group

C.

Delete all emails with attachments

D.

Limit the use of administrative privileges to only when required

Full Access
Question # 38

Some Employee of his organization launched a privilege escalation attack to gain root access on one of the organization's database serversiThe employee does have an authorized user account on the server. What log file would be MOST likely to contain relevant information??

A.

Database application log

B.

Firewall log

C.

Operating system log

D.

IDS log

Full Access
Question # 39

What kind of control is, when we add a backup firewall that takes over if the main one stops working?

A.

Clustering

B.

High availability(HA)

C.

Load balancing

D.

Component redundancy

Full Access
Question # 40

Exhibit.

CC question answer

information security is not built on which of the following?

A.

Confidentiality

B.

Availability

C.

Accessibility

D.

Integrity

Full Access
Question # 41

Faking the sending address of a transmission to gain illegal entry into a secure system.

A.

Phishing

B.

ARP

C.

Spoofing

D.

ALL

Full Access
Question # 42

Which of the following protocols is a secure alternative to using telnet?

A.

SSH

B.

HTTPS

C.

SFTP

D.

LDAPS

Full Access
Question # 43

When is the Business Continuity Plan Enacted?

A.

When there is a event

B.

When there is a incident

C.

When there is a loss of business operations

D.

When there is a natural disaster

Full Access
Question # 44

Selvaa presents a userid and a password to a system in order to log on. Which of the following characteristics must the userid have?

A.

Autherization

B.

Authentication

C.

Availability

D.

Identification

Full Access
Question # 45

What are the primary responsibilities of a computer incident response team (CIRT) during an incident?

A.

To determine the difference between minor and major incident

B.

To troubleshoot network and system issues

C.

To provide medical assistance at accident scenes

D.

To asses the amount and scope of damage caused by the incident

Full Access
Question # 46

EKristal is the security administrator for a large online service provider. Kristal learns that the company is harvesting personal data of its customers and sharing the data with local governments where the company operates, without the knowledge of the users, to allow the governments to persecute users on the basis of their political and philosophical beliefs. The published user agreement states that the company will not share personal user data with any entities without the users' explicit permission. According to the ISC2 Code of Ethics, to whom does Kristal ultimately report in this situation?

A.

The company Kristal works for

B.

The governments of the countries where the company operates

C.

ISC2

D.

The users

Full Access
Question # 47

What is the range of well known ports

A.

0 - 1023

B.

1023-49151

C.

49152 - 65535

D.

None

Full Access
Question # 48

Incident management is also known as

A.

Risk Management

B.

Business Continuity management

C.

Incident management

D.

Crisis management

Full Access
Question # 49

Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

A.

Brute-force attack

B.

Dictionary attack

C.

Social engineering attack

D.

Replay attack

Full Access
Question # 50

Which ensure maintaining business operations during or after an incident

A.

Incident Response

B.

Business Continuity

C.

Disaster Recovery

D.

AII

Full Access
Question # 51

Communication between end systems is encrypted using a key, often known as________?

A.

Temporary Key

B.

Section Key

C.

Public Key

D.

Session Key

Full Access
Question # 52

What is the main challenge in achieving non repudiation in electronic transactions

A.

Ensuring the identity of the sender and recipient is verified

B.

Ensuring the authenticity and integrity of the message

C.

Making sure the message is not tampered with during transmission

D.

All of the above

Full Access
Question # 53

A Company IT system experienced a system crash that result in a loss of data. What term best describes this event?

A.

Breach

B.

Incident

C.

Event

D.

Adverse Event

Full Access
Question # 54

A organization's security system which involves in preventing, detecting, analyzing, and responding to cybersecurity incidents.

A.

Business continuity team

B.

Disaster recovery team

C.

Incident response team

D.

Security operations center

Full Access
Question # 55

Which version of TLS is considered to be the most secure and recommended for use?

A.

TLS 1.0

B.

TLS 1.1

C.

TLS 1.2

D.

TLS 1.3

Full Access
Question # 56

What is the purpose of defense in depth in information security

A.

To Implement only technical controls to prevent a cyber attack

B.

To provide unrestricted access to organization assets

C.

To establish variable barriers across multiple layers and mission of the organization

D.

To guarantee that a cyber attack will not occur

Full Access
Question # 57

What is the recommended fire suppression system for server rooms

A.

Foam based

B.

Water based

C.

Powder based

D.

ftac hacorl

Full Access
Question # 58

Uses multiple types of access controls in literal or theoretical

layers to help an organization avoid a monolithic security

A.

DMZ

B.

VLAN

C.

Defence in Depth

D.

VPN

Full Access
Question # 59

Structured way to align IT with business goals while managing risks and meeting all industry and government regulations

A.

GRC

B.

Policies

C.

Law

D.

Stanfard

Full Access
Question # 60

What is the primary goal of implementing input validation in application security?

A.

To ensure all inputs are stored in a secure database

B.

To prevent unauthorized access to the application

C.

To validate and sanitize user inputs to prevent code injection attacks (Correct)

D.

To encrypt sensitive data transmitted between the client and server

Full Access
Question # 61

What is the main purpose of using digital signatures in communication security?

A.

To encrypt sensitive data during transmission

B.

To verify the identity of the sender and ensure the integrity of the message (Correct)

C.

To prevent unauthorized access to a network

D.

To compress data to reduce bandwidth usage

Full Access
Question # 62

Timiting access to resources based on the sensitivity of the information that the resource contains and the authorization of the user to access information with that level of sensitivity.

A.

DAC

B.

MAC

C.

RuBAC

D.

RBAC

Full Access
Question # 63

Which is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary's attack lifecycle and the platforms they are known to target

A.

MITRE ATT&CK

B.

CVE

C.

Risk Management framework

D.

Security Management

Full Access
Question # 64

Which layer of OSI the Firewall works

A.

Layer 3

B.

Layer 4

C.

Layer 7

D.

AII

Full Access
Question # 65

Which security control mostly used to prevent data breach

A.

Physical control

B.

Logical Control

C.

Adminstrative Control

D.

RBAC

Full Access
Question # 66

Which type of authentication is something which you

A.

Type1

B.

Type 2

C.

Type 3

D.

Type 4

Full Access
Question # 67

Which layer does VLAN hopping belong to?

A.

Layer 3

B.

Layer 4

C.

Layer 7

D.

Layer 2

Full Access
Question # 68

Which maintains that a user or entity should only have access to the spec data, resources and applications needed to complete a required task.

A.

Zero Trust

B.

Defence in Depth

C.

Least Privileges

D.

AII

Full Access
Question # 69

What is an incident in the context of cybersecurity

A.

Any observable occurrence in a network or system

B.

A deliberate security incident in which an intruder gains access to a system or system resource without authorization

C.

A particular attack that exploits system vulnerabilities

D.

An event that actually or potentially jeopardizes the confidentiality integrity or availability of an information system.

Full Access
Question # 70

Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?

A.

Non-repudiation

B.

Integrity

C.

Availability

D.

Confidentiality

Full Access
Question # 71

Derrick logs on to a system in order to read a file. In this example. Derrick is the______?

A.

Subject

B.

Object

C.

Process

D.

Predicate

Full Access
Question # 72

Which of the following is the least secure communications protocol?

A.

CHAP

B.

Ipsec

C.

PAP

D.

EAP

Full Access
Question # 73

What is the main purpose of creating baseline in ensuring system integrity

A.

To compare the baseline with the current state of the systems

B.

To protect the information

C.

To understand the current state of the system

D.

AII

Full Access
Question # 74

Which type of attack attempts to gain information by observing the devices power consumption

A.

DOS

B.

Side Channles

C.

XSS

D.

XSRF

Full Access
Question # 75

Can be considered to be a fingerprint of the file or message

A.

Hashing .

B.

encryption

C.

decryption

D.

encoding

Full Access
Question # 76

Which type of database combines related records and fields into a logical tree structure?

A.

Relational

B.

Hierarchical

C.

Object-oriented

D.

Network

Full Access
Question # 77

Which Prevents Threat

A.

Antivirus

B.

IDS

C.

SIEM

D.

HIDS

Full Access
Question # 78

The amount of risk, at a broad level, that an organization is

willing to accept in pursuit of its strategic objectives.

A.

Risk Assessment

B.

Risk Transfer

C.

Risk Appetite

D.

Risk Management

Full Access
Question # 79

Which of the following is a subject?

A.

file

B.

fence

C.

filename

D.

user

Full Access
Question # 80

When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called______

A.

Malware

B.

Zero-day

C.

Event

D.

Attack

Full Access
Question # 81

How does IPSec protect against reply attacks

A.

By using sequence numbers

B.

By limiting access to the network

C.

By using digital signatures

D.

By encryption all network traffic

Full Access
Question # 82

Are a measure of an organization's baseline of security performance

A.

Security Assessment

B.

Secuirty Audit

C.

Security Benchmark

D.

Security Management

Full Access
Question # 83

Which of the following physical controls is used to protect against eavesdropping and data theft through electromagnetic radiation

A.

EMI Shielding

B.

Screening rooms

C.

White noise generators

D.

ALL

Full Access
Question # 84

Actions, processes and tools for ensuring an organization can continue critical operations during a contingency.

A.

BC

B.

DR

C.

IR

D.

AII

Full Access
Question # 85

When the ISC2 Mail server sends mail to other mail servers it becomes —?

A.

SMTP Server

B.

SMTP Peer

C.

SMTP Master

D.

SMTP Client

Full Access
Question # 86

A company primary data center goes down due to a hardware failure causing a major disruption to the IT and communications systems. What is the focus of disaster recovery planning in this scenario

A.

Maintaining critical business functions during the disruption

B.

Fixing the hardware failure

C.

Restoring IT and communications back to full operations after the disruptions

D.

Guiding the actions of emergency response personnel during the disruption

Full Access
Question # 87

Which of the following is NOT one of the three main components of a sql database?

A.

Views

B.

Schemas

C.

Tables

D.

Object-oriented interfaces

Full Access
Question # 88

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which one of the following controls would BEST achieve his objective?

A.

URL Filter

B.

IP Address Block

C.

DLP Solution

D.

IPS Solution

Full Access
Question # 89

Who should participate in creating a BCP

A.

Only members from the IT department

B.

Only members from the management team

C.

Members from across the organization

D.

Only members from the finanace department

Full Access
Question # 90

Created by switches to logically segment a network without altering its physical topology.

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Full Access
Question # 91

In what way do a victim's files get affected by ransomware?

A.

By destroying them

B.

By encrypting them

C.

By stealing them

D.

By selling them

Full Access
Question # 92

Which type of application can intercept sensitive information such as passwords on a network segment?

A.

Log server

B.

Network Scanner

C.

Firewall

D.

Protocol Analyzer

Full Access
Question # 93

provide integrity services that allow a recipient to verify that a message has not been altered.

A.

Hashing

B.

encryption

C.

decryption

D.

encoding

Full Access
Question # 94

The testing or evaluation of security controls to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for an information system or organization.

A.

Security Assessment

B.

Risk Assessment

C.

DRP

D.

IRP

Full Access
Question # 95

What is the first step in incident response planning

A.

Develop a policy approved by management

B.

Identify critical data and systems

C.

Train staff on incident response

D.

implement an incident response team

Full Access
Question # 96

What is the potential impact of an IPSec reply attack

A.

Modification of network traffic

B.

Disruption of network communication

C.

Unauthorized access to network resources

D.

ALL

Full Access
Question # 97

What is multi-factor authentication (MFA)?

A.

A type of authentication that uses only one method

B.

A type of authentication that uses only two methods

C.

A type of authentication that uses more than two methods (Correct)

D.

A type of authentication that uses only one factor

Full Access
Question # 98

Which of the following documents contains elements that are NOT mandatory

A.

Procedures

B.

Policies

C.

Regulations

D.

Guidelines

Full Access
Question # 99

The method of distributing network traffic equally across a pool of resources that support an application

A.

Vlan

B.

DNS

C.

VPN

D.

Load Balancing

Full Access
Question # 100

Ignoring the risk and proceeding the business operations

A.

Risk Acceptance

B.

Risk Mitigation

C.

Risk Avoidance

D.

Risk Transfer

Full Access
Question # 101

Which of the following security controls is designed to prevent unauthorized access to sensitive information by ensuring that it is only accessible to authorized users?

A.

Encryption

B.

Firewall

C.

Antivirus

D.

Access control

Full Access
Question # 102

After an Earthquake disrupting business operations, which documents contains the reactive procedures required to return business to normal operations

A.

The Business Impact Analysis

B.

The Business Continuity Plan

C.

The Disaster Recovery plan

D.

The Business Impact Plan

Full Access
Question # 103

The Bell and LaPadula access control model is a form of

A.

RBAC

B.

MAC

C.

DAC

D.

ABAC

Full Access
Question # 104

Which of these is the most efficient and effective way to test a business continuity plan

A.

Simulations

B.

Discussions

C.

Walkthroughs

D.

Reviews

Full Access
Question # 105

Removing the design belief that the network has any trusted space. Security is managed at eachpossible level, representing the most granular asset. Micro segmentation of workloads is a tool of the model.

A.

Zero Trust

B.

DMZ

C.

VLAN

D.

Micro Segmentation

Full Access
Question # 106

Natalia is concerned that users on her network may be storing sensitive information, such as social security numbers, on their hard drives without proper authorization or security controls. What 3rd -party security service can she implement to best detect this activity?

A.

IDS - Intrusion Detection System

B.

IPS - Intrusion Prevention System

C.

DLP - Data Loss Protection

D.

TLS - Transport Layer Security

Full Access
Question # 107

You experienced a power outage that disrupted access to your data center. What type of security concern occurred?

A.

Availability

B.

Confidentiality

C.

Non-Repudiation

D.

Integrity

Full Access
Question # 108

A hacker gains access to a compony network and begins to intercept network traffic in order to steal login credentials which OSI layer is being attacked

A.

Data Link layer

B.

Physical layer

C.

Network Layer

D.

Application laver

Full Access
Question # 109

An unknown person obtaining access to the company file system without authorization is example of

A.

Intrusion

B.

Breach

C.

Exploit

D.

Incident

Full Access
Question # 110

A company data center has been breached by hackers and all its systems have been taken down what is the main objective of the DRP in such a scenario?

A.

To relocate the data center to another location

B.

To ensure the physical safety of employees in the data center

C.

To investigate and prosecute the hackers responsible of the attack

D.

To restore the IT systems to their last known state

Full Access
Question # 111

Faking the sender address in a transmission to gain illegal entry into a secure system

A.

Phishing

B.

ARP

C.

Spoofing

D.

ALL

Full Access
Question # 112

Which is the loopback address

A.

::1

B.

127.0.0.1

C.

255.255.255.0

D.

Both A and B

Full Access
Question # 113

The practice of ensuring that an organizational process cannot be completed by a single person; forces collusion as a means to reduce insider threats.

A.

Segregation of Duties

B.

Principle of Least Privilege

C.

Privileged Account

D.

Rule-based access control

Full Access
Question # 114

Which of the following attacks can TLS help mitigate?

A.

Cross-site Scripting (XSS) Attacks

B.

Social Engineering Attacks

C.

Man-in-the-middle (MiTm) Attacks (Correct)

D.

SQL Injection Attacks

Full Access
Question # 115

Which of these activities is often associated with DR efforts?

A.

Running anti-malware solutions

B.

Scanning the IT environment for vulnerabilities

C.

Zero-day exploits

D.

Employees returning to the primary production location

Full Access
Question # 116

Which device is used to control traffic flow in network

A.

SDN

B.

Switch

C.

Hub

D.

Router

Full Access
Question # 117

which is the short form of IPv6 address 2001:0db8:0000:0000:0000:ffff:0000:0001

A.

2001:db8::ffff:0:1

B.

2001:db8:0000:ffff:0:1

C.

2001:db80::ffff:0000:1

D.

2001:db8::ffff:0000:0001

Full Access
Question # 118

Which is strongly used for Securing Wi-Fi

A.

WPA2

B.

WEP

C.

WPA

D.

SSL

Full Access
Question # 119

Which is not the function of IPS

A.

To encrypt network traffic

B.

To monitor network traffic

C.

To filter network traffic

D.

To detect and prevent attacks

Full Access
Question # 120

Port forwarding is also known as

A.

Port mapping

B.

Tunneling

C.

Punch through

D.

ALL

Full Access
Question # 121

The prevention of authorized access to resources or the delaying of time critical operations.

A.

ARP Poisoning

B.

Syn Flood

C.

Denial-of-Service (DoS)

D.

AII

Full Access
Question # 122

Example of Deterrent controls

A.

CCTV

B.

BCP

C.

DRP

D.

IRP

Full Access