Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CC Questions and Answers

Question # 6

Which is the loopback address?

A.

::1

B.

127.0.0.1

C.

255.255.255.0

D.

Both A and B

Full Access
Question # 7

Derrick logs on to a system in order to read a file. In this example, Derrick is the ______?

A.

Subject

B.

Object

C.

Process

D.

Predicate

Full Access
Question # 8

Which access control model grants permissions based ondata sensitivityanduser job functions?

A.

DAC

B.

RBAC

C.

MAC

D.

RuBAC

Full Access
Question # 9

What is the purpose of immediate response procedures in a BCP?

A.

To notify personnel the BCP is activated

B.

To guide management

C.

To protect CIA

D.

To account for operations

Full Access
Question # 10

A method for risk analysis that is based on the assignment of a descriptor such as low, medium, or high.

A.

Quantitative Risk Analysis

B.

Risk Assessment

C.

Risk Mitigation

D.

Qualitative Risk Analysis

Full Access
Question # 11

Which authentication enables automatic identification across multiple service providers?

A.

Basic

B.

Kerberos

C.

Token-based

D.

Federated

Full Access
Question # 12

Why is the recovery of IT often crucial to the recovery and sustainment of business operations?

A.

IT is not important to business operations

B.

IT is often the cause of disasters

C.

IT can be easily recovered without impact

D.

Many businesses rely heavily on IT for operations

Full Access
Question # 13

A one-way spinning door or barrier that allows only one person at a time to enter a building or area.

A.

Turnstile

B.

Mantrap

C.

Bollard

D.

Gate

Full Access
Question # 14

Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

A.

Brute-force attack

B.

Dictionary attack

C.

Social engineering attack

D.

Replay attack

Full Access
Question # 15

Which element of the security policy framework includes recommendations that are NOT binding?

A.

Procedures

B.

Guidelines

C.

Standards

D.

Policies

Full Access
Question # 16

A company network experiences a sudden flood of network packets that causes major slowdown in Internet traffic. What type of event is this?

A.

Security incident

B.

Natural disaster

C.

Exploit

D.

Adverse event

Full Access
Question # 17

Dylan is creating a cloud architecture that requires connections between systems in two different private VPCs. What is the BEST way to enable this access?

A.

VPN connection

B.

Internet gateway

C.

Public IP address

D.

VPC endpoint

Full Access
Question # 18

Who must follow HIPAA compliance?

A.

Energy sector

B.

Health care

C.

Finance sector

D.

All

Full Access
Question # 19

Which one of the following groups is NOT normally part of an organization's cybersecurity incident response team?

A.

Technical subject matter experts

B.

Cybersecurity experts

C.

Management

D.

Law enforcement

Full Access
Question # 20

Token Ring operates at which OSI layer?

A.

Application

B.

Network

C.

Transport

D.

Physical

Full Access
Question # 21

Which TLS extension is used to optimize the TLS handshake process by reducing the number of round trips between the client and server?

A.

TLS Renegotiation

B.

TLS Heartbeat

C.

TLS Session Resumption

D.

TLS FastTrack

Full Access
Question # 22

Which zero-trust component breaks LANs into very small, localized security zones?

A.

Zero Trust

B.

DMZ

C.

VPN

D.

Microsegmentation

Full Access
Question # 23

When is the Business Continuity Plan (BCP) enacted?

A.

When there is an event

B.

When there is an incident

C.

When there is a loss of business operations

D.

When there is a natural disaster

Full Access
Question # 24

Which of the following is NOT a feature of a cryptographic hash function?

A.

Deterministic

B.

Unique

C.

Useful

D.

Reversible

Full Access
Question # 25

An event that jeopardizes confidentiality, integrity, or availability is called:

A.

Breach

B.

Event

C.

Incident

D.

Exploit

Full Access
Question # 26

An agreement between a cloud service provider and a customer based on cloud-specific terms is called:

A.

Memorandum of Understanding

B.

Memorandum of Agreement

C.

Service Level Agreement (SLA)

D.

All

Full Access
Question # 27

Which principle aims primarily at fraud detection?

A.

Defense in depth

B.

Least privilege

C.

Separation of duties

D.

Privileged account

Full Access
Question # 28

Which of the following is unlikely to be a member of the disaster recovery team?

A.

Executive management

B.

Public relations

C.

Billing clerk

D.

IT personnel

Full Access
Question # 29

An attacker places themselves between two communicating devices is known as:

A.

Phishing

B.

Spoofing

C.

On-Path attack

D.

All

Full Access
Question # 30

What is the difference between Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)?

A.

BCP restores IT systems, DRP maintains business functions

B.

DRP restores IT and communications, BCP maintains critical business functions

C.

They are the same

D.

BCP only applies before disasters

Full Access
Question # 31

Which of the following best describes a zero-day vulnerability?

A.

A vulnerability that has been identified and patched

B.

A vulnerability that has not yet been discovered or publicly disclosed

C.

A vulnerability exploitable only by experts

D.

A vulnerability that affects only legacy systems

Full Access
Question # 32

Granting a user access to services or a system is known as:

A.

Authentication

B.

Identification

C.

Authorization

D.

Confidentiality

Full Access
Question # 33

Why is a “Red Book” important in Business Continuity Planning?

A.

To have a hard copy for easy access

B.

Easy to carry and transfer

C.

When disasters disable power and electronic access

D.

All

Full Access
Question # 34

An approach using software-based controllers and APIs to direct network traffic:

A.

VLAN

B.

SDN

C.

VPN

D.

SAN

Full Access
Question # 35

Which control identifies that an attack has occurred or is occurring?

A.

Preventive control

B.

Detective control

C.

Corrective control

D.

Recovery control

Full Access
Question # 36

A tool used to inspect outbound traffic to reduce threats:

A.

Anti-malware

B.

NIDS

C.

DLP

D.

Firewall

Full Access
Question # 37

Which is related to privacy?

A.

GDPR

B.

FIPS

C.

MOU

D.

All

Full Access
Question # 38

An analysis of system requirements and interdependencies used to prioritize recovery is known as:

A.

BIA

B.

DR

C.

BCP

D.

IRP

Full Access
Question # 39

An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant is known as:

A.

Eavesdropping attack

B.

CSRF

C.

XSS

D.

ARP spoofing

Full Access
Question # 40

Port forwarding is also known as:

A.

Port mapping

B.

Tunneling

C.

Punch-through

D.

All

Full Access
Question # 41

_______ are virtual separations within a switch used mainly to limit broadcast traffic.

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Full Access
Question # 42

A structured approach used to oversee and manage risk for an enterprise is called:

A.

Risk assessment

B.

Risk threshold

C.

Risk Management Framework

D.

Risk appetite

Full Access
Question # 43

When the ISC2 mail server sends mail to other mail servers, it becomes a —?

A.

SMTP Server

B.

SMTP Peer

C.

SMTP Master

D.

SMTP Client

Full Access
Question # 44

David's team recently implemented a new system that gathers information from a variety of different log sources, analyzes that information, and then triggers automated playbooks in response to security events. What term BEST describes this technology?

A.

SIEM

B.

Log Repository

C.

IPS

D.

SOAR

Full Access
Question # 45

The prevention of authorized access to resources or the delaying of time-critical operations is known as:

A.

ARP poisoning

B.

SYN flood

C.

Denial-of-Service (DoS)

D.

All

Full Access
Question # 46

What is meant by non-repudiation?

A.

If a user does something, they can't later claim that they didn't do it.

B.

Controls to protect the organization's reputation from harm due to inappropriate social media postings by employees, even if on their private accounts and personal time.

C.

It is part of the rules set by administrative controls.

D.

It is a security feature that prevents session replay attacks.

Full Access
Question # 47

What is the primary goal of Identity and Access Management (IAM) in cybersecurity?

A.

To ensure 100% security against all threats

B.

To provide secure and controlled access to resources

C.

To eliminate the need for user authentication

D.

To monitor network traffic for performance optimization

Full Access
Question # 48

You experienced a power outage that disrupted access to your data center. What type of security concern occurred?

A.

Availability

B.

Confidentiality

C.

Non-repudiation

D.

Integrity

Full Access
Question # 49

What is the purpose of the post-incident phase?

A.

Detection and analysis

B.

Preparation

C.

Lessons learned and improvement

D.

Containment and eradication

Full Access
Question # 50

David is worried about distributed denial-of-service (DDoS) attacks against his company’s primary web application. Which option will provide the MOST resilience against large-scale DDoS attacks?

A.

Implement a CDN

B.

Increase the number of servers in the web application cluster

C.

Contract for DDoS mitigation services via the company’s IPS

D.

Increase bandwidth from one or more ISPs

Full Access
Question # 51

Mark has purchased a Mac laptop. He is scared of losing his screen and is planning to buy an insurance policy. Which risk management strategy is this?

A.

Risk acceptance

B.

Risk deterrence

C.

Risk transference

D.

Risk mitigation

Full Access
Question # 52

COVID-19 is an example where which plan sustains business?

A.

IRP

B.

DRP

C.

BCP

D.

All

Full Access
Question # 53

The harmonization of automated computing tasks into reusable workflows is called:

A.

Cloud orchestration

B.

Cloud manager

C.

Cloud broker

D.

Cloud controller

Full Access
Question # 54

How does IPSec protect against replay attacks?

A.

By using sequence numbers

B.

By limiting network access

C.

By using digital signatures

D.

By encrypting all traffic

Full Access
Question # 55

Which OSI layer does a VPN primarily operate at?

A.

Layer 5

B.

Layer 6

C.

Layer 1

D.

Layer 3

Full Access
Question # 56

Type 1 authentication poses which risks?

A.

Users may share their credentials with others

B.

Users may forget their passwords

C.

Passwords may be intercepted and stolen

D.

All

Full Access
Question # 57

What cybersecurity principle focuses on granting users only the privileges necessary to perform their job functions?

A.

Least privilege

B.

Defense in depth

C.

Separation of duties

D.

Need-to-know basis

Full Access
Question # 58

Who is responsible for publishing and signing the organization’s policies?

A.

The security office

B.

Human resources

C.

Senior management

D.

The legal department

Full Access
Question # 59

Which principle states that users should have access only to the specific data and resources needed to perform required tasks?

A.

Zero Trust

B.

Defense in Depth

C.

Least Privilege

D.

All

Full Access
Question # 60

Which is related to standards?

A.

NIST

B.

GDPR

C.

HIPAA

D.

All

Full Access
Question # 61

Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?

A.

Non-repudiation

B.

Integrity

C.

Availability

D.

Confidentiality

Full Access
Question # 62

Which of the following does NOT normally influence an organization’s log retention policy?

A.

Laws

B.

Corporate governance

C.

Regulations

D.

Audits

Full Access
Question # 63

Which type of authentication issomething which you know?

A.

Type 1

B.

Type 2

C.

Type 3

D.

Type 4

Full Access
Question # 64

Flooding a server with traffic to make services unavailable is called:

A.

Phishing

B.

Virus

C.

Spoofing

D.

DDoS

Full Access
Question # 65

Malicious code that acts like a remotely controlled “robot” for an attacker.

A.

Rootkit

B.

Malware

C.

Bot

D.

Virus

Full Access
Question # 66

Limiting access based on data sensitivity and user authorization is known as:

A.

DAC

B.

MAC

C.

RuBAC

D.

RBAC

Full Access
Question # 67

Which type of encryption uses only one shared key to encrypt and decrypt?

A.

Public key

B.

Asymmetric

C.

Symmetric

D.

TCB key

Full Access
Question # 68

What is an incident in cybersecurity?

A.

Any event

B.

Unauthorized access

C.

An exploit

D.

An event that jeopardizes CIA

Full Access
Question # 69

Hashing safeguards which CIA triad principle?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

All

Full Access
Question # 70

Permitting authorized access while preventing improper disclosure.

A.

Integrity

B.

Confidentiality

C.

Availability

D.

All

Full Access
Question # 71

Which is strongly used for securing Wi-Fi?

A.

WPA2

B.

WEP

C.

WPA

D.

SSL

Full Access
Question # 72

Which is NOT a possible model for an Incident Response Team (IRT)?

A.

Leveraged

B.

Dedicated

C.

Hybrid

D.

Outsourced

Full Access
Question # 73

What kind of control is it when we add a backup firewall that takes over if the main one stops working?

A.

Clustering

B.

High availability (HA)

C.

Load balancing

D.

Component redundancy

Full Access
Question # 74

What is the difference between BCP and DRP?

A.

BCP restores IT; DRP maintains business functions

B.

DRP restores IT; BCP maintains business functions

C.

They are the same

D.

BCP is only before disasters

Full Access
Question # 75

A company wants to prevent employees from bringing unauthorized electronic devices into the workspace. Which physical control is best?

A.

Metal detectors

B.

Security guards

C.

RFID scanners

D.

Baggage X-ray machines

Full Access
Question # 76

What is the focus of disaster recovery planning after a data center failure?

A.

Maintain business functions

B.

Fix hardware

C.

Restore IT and communications

D.

Guide emergency responders

Full Access
Question # 77

Information should be consistently and readily accessible for authorized parties.

A.

Confidentiality

B.

Authentication

C.

Availability

D.

Non-repudiation

Full Access
Question # 78

What is the recommended fire suppression system for server rooms?

A.

Foam-based

B.

Water-based

C.

Powder-based

D.

Clean-agent gas systems (e.g., FM-200 / Inergen)

Full Access
Question # 79

What is the main purpose of digital signatures?

A.

Encrypt data

B.

Verify sender identity and ensure message integrity

C.

Prevent network access

D.

Compress data

Full Access
Question # 80

Which organization defines Internet protocol standards?

A.

ISO

B.

NIST

C.

IETF

D.

GDPR

Full Access
Question # 81

Which phase of the access control process (AAA) does a user prove his/her identity?

A.

Authentication

B.

Authorization

C.

Identification

D.

Accounting

Full Access
Question # 82

A centralized organizational function that monitors, detects, and analyzes security events to prevent disruptions is called:

A.

IRP

B.

BCP

C.

SOC

D.

DRP

Full Access
Question # 83

Load balancing primarily safeguards which CIA triad element?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

All

Full Access
Question # 84

Incident management is also known as:

A.

Risk management

B.

Business continuity management

C.

Incident management

D.

Crisis management

Full Access
Question # 85

What is an IP address?

A.

A physical address

B.

A vendor identifier

C.

A logical address associated with a network interface

D.

A hardware address

Full Access
Question # 86

Which term describes a communication tunnel that provides point-to-point transmission of authentication and data traffic over an untrusted network?

A.

Zero Trust

B.

DMZ

C.

VPN

D.

None of the above

Full Access
Question # 87

Which attack most effectively maintains remote access and control over a victim’s computer?

A.

Phishing

B.

Trojans

C.

XSS

D.

Rootkits

Full Access
Question # 88

What is the recommended temperature range for optimal data center uptime?

A.

62°F–69°F

B.

64°F–81°F

C.

82°F–90°F

D.

91°F–100°F

Full Access
Question # 89

Activities necessary to restore IT and communications services are known as:

A.

Incident response

B.

Business continuity

C.

Risk management

D.

Disaster recovery

Full Access
Question # 90

Example of token-based authentication:

A.

Kerberos

B.

Basic

C.

OAuth

D.

NTLM

Full Access
Question # 91

The highest-level governance documents approved by management are:

A.

Standards

B.

Policies

C.

Procedures

D.

Laws or regulations

Full Access
Question # 92

What goal of security is enhanced by a strong business continuity program?

A.

Non-repudiation

B.

Availability

C.

Confidentiality

D.

Integrity

Full Access
Question # 93

Which type of database combines related records and fields into a logical tree structure?

A.

Relational

B.

Hierarchical

C.

Object-oriented

D.

Network

Full Access
Question # 94

Which technology should be implemented to increase the work effort required for buffer overflow attacks?

A.

Address Space Layout Randomization

B.

Memory induction application

C.

Input memory isolation

D.

Read-only memory integrity checks

Full Access
Question # 95

Which ensures maintaining business operations during or after an incident?

A.

Incident Response

B.

Business Continuity

C.

Disaster Recovery

D.

All

Full Access
Question # 96

Natalia is concerned that users on her network may be storing sensitive information, such as Social Security numbers, on their hard drives without proper authorization or security controls. What third-party security service can she implement to best detect this activity?

A.

IDS – Intrusion Detection System

B.

IPS – Intrusion Prevention System

C.

DLP – Data Loss Protection

D.

TLS – Transport Layer Security

Full Access
Question # 97

Which penetration testing technique requires the team to do the MOST work and effort?

A.

White box

B.

Blue box

C.

Gray box

D.

Black box

Full Access
Question # 98

What is the primary goal of a risk management process in cybersecurity?

A.

Eliminate all risks

B.

Transfer all risks

C.

Identify, assess, and mitigate risks to an acceptable level

D.

Ignore risks

Full Access
Question # 99

The common term for systems that control temperature and humidity in a data center is:

A.

VLAN

B.

STAT

C.

TAWC

D.

HVAC

Full Access
Question # 100

The prevention of authorized access to resources or delaying time-critical operations is known as:

A.

DDoS

B.

Authorization

C.

Authentication

D.

Availability

Full Access
Question # 101

During an ISC2 CC exam, you observe another candidate cheating. What should you do?

A.

Yell at them

B.

Do nothing

C.

Report the candidate to ISC2

D.

Call law enforcement

Full Access
Question # 102

Created by switches to logically segment a network without changing physical topology:

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Full Access
Question # 103

What is a threat in cybersecurity?

A.

A system weakness

B.

Something to protect

C.

A method of attack

D.

A person or thing that exploits vulnerabilities

Full Access
Question # 104

Why is identifying roles and responsibilities important in IR planning?

A.

To prevent incidents

B.

To ensure everyone knows their role

C.

To reduce impact

D.

To select containment strategy

Full Access
Question # 105

What is the range of well-known ports?

A.

0–1023

B.

1024–49151

C.

49152–65535

D.

None

Full Access
Question # 106

A DDoS attack flooding ICMP packets is called:

A.

DoS

B.

SYN flood

C.

Smurf attack

D.

Phishing

Full Access
Question # 107

An organization develops procedures to restore critical business processes after a major disruption. What plan is this?

A.

BCP

B.

IRP

C.

DRP

D.

None

Full Access
Question # 108

A system crash results in loss of data. What term best describes this?

A.

Breach

B.

Incident

C.

Event

D.

Adverse event

Full Access
Question # 109

Embedded systems and network-enabled devices that communicate with the Internet are:

A.

Endpoints

B.

Nodes

C.

IoT

D.

Routers

Full Access
Question # 110

Ensuring a process cannot be completed by a single person is known as:

A.

Segregation of duties

B.

Least privilege

C.

Privileged account

D.

Rule-based access control

Full Access
Question # 111

Which provides integrity services that allow a recipient to verify that a message has not been altered?

A.

Hashing

B.

Encryption

C.

Decryption

D.

Encoding

Full Access
Question # 112

Networks that are heavily microsegmented with firewalls at connection points are characteristic of:

A.

DMZ

B.

VPN

C.

VLAN

D.

Zero Trust

Full Access
Question # 113

A company experiences a major IT outage and cannot perform critical business functions. Which plan helps recovery?

A.

BCP

B.

IRP

C.

DRP

D.

BIA

Full Access
Question # 114

Security controls protecting against fire, floods, and earthquakes are:

A.

Physical controls

B.

Logical controls

C.

Administrative controls

D.

Technical controls

Full Access
Question # 115

Which of the following is NOT an element of system security configuration management?

A.

Baselines

B.

Updates

C.

Inventory

D.

Audit logs

Full Access
Question # 116

Which threat is directly associated with malware?

A.

APT

B.

Ransomware

C.

Trojan

D.

DDoS

Full Access
Question # 117

Which allows extremely granular restrictions down to individual machines or users?

A.

DMZ

B.

Microsegmentation

C.

VLAN

D.

NAC

Full Access
Question # 118

Shaun is planning to protect data in all states (at rest, in motion, and in use), defending against data leakage. What is the BEST solution to implement?

A.

End-to-end encryption

B.

Hashing

C.

DLP

D.

Threat modeling

Full Access
Question # 119

Restoring IT and communications after a disruption is the goal of:

A.

BCP

B.

IRP

C.

DRP

D.

None

Full Access
Question # 120

Which document provides a high-level overview of a Disaster Recovery Plan?

A.

Technical guides

B.

Department-specific plans

C.

Full plan copies for team members

D.

Executive summary

Full Access