⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
ISC2 Certified in Cybersecurity Exam Questions
with verified answers
⪛⪴⪴⪷⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
Q1: Is it possible to avoid risk?
A. Yes
B. No
C. Sometimes
D. Never - correct answer ✔A
Q2: What is meant by non-repudiation?A. If a user does something, they can't
later claim that they didn't do it.
B. Controls to protect the organization's reputation from harm due to
inappropriate social media postings by employees, even if on their private
accounts and personal time.
C. It is part of the rules set by administrative controls.
D. It is a security feature that prevents session replay attacks. - correct answer
✔A
Q3: Which of the following is very likely to be used in a disaster recovery effort?
A. Guard dogs
B. Data backups
C. Contract personnel
D. Antimalware solutions - correct answer ✔B
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
,⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
Q4: Which of the following is very likely to be used in a disaster recovery effort?
A. Guard dogs
B. Data backups
C. Contract personnel
D. Antimalware solutions - correct answer ✔B
Q5: Which of these components is very likely to be instrumental to any disaster
recovery (DR) effort?
A. Routers
B. Laptops
C. Firewalls
D. Backups - correct answer ✔D
Q6: Which of the following is a subject?A. file
B. fence
C. filename
D. user - correct answer ✔D
Q7: Common network device used to connect networks?
A. Server
B. Endpoint
C. Router
D. Switch - correct answer ✔C
Q8: A common network device used to filter traffic?
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
, ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
A. Server
B. Endpoint
C. Ethernet
D. Firewal - correct answer ✔D
Q9: Who is responsible for publishing and signing the organization's policies?A.
The security office
B. Human resources
C. Senior management
D. The legal department - correct answer ✔C
Q10: A set of security controls or system settings used to ensure uniformity of
configuration through the IT environment?
A. Patches
B. Inventory
C. Baseline
D. Policy - correct answer ✔C
Q12: Mike is concerned that users on her network may be storing sensitive
information, such as Social Security numbers, on their hard drives without
proper authorization or security controls. What third-party security service can
she implement to BEST detect this activity?
A. IDS
B. IPS
C. DLP
D. TLS - correct answer ✔C
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
ISC2 Certified in Cybersecurity Exam Questions
with verified answers
⪛⪴⪴⪷⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ε ΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
Q1: Is it possible to avoid risk?
A. Yes
B. No
C. Sometimes
D. Never - correct answer ✔A
Q2: What is meant by non-repudiation?A. If a user does something, they can't
later claim that they didn't do it.
B. Controls to protect the organization's reputation from harm due to
inappropriate social media postings by employees, even if on their private
accounts and personal time.
C. It is part of the rules set by administrative controls.
D. It is a security feature that prevents session replay attacks. - correct answer
✔A
Q3: Which of the following is very likely to be used in a disaster recovery effort?
A. Guard dogs
B. Data backups
C. Contract personnel
D. Antimalware solutions - correct answer ✔B
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
,⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
Q4: Which of the following is very likely to be used in a disaster recovery effort?
A. Guard dogs
B. Data backups
C. Contract personnel
D. Antimalware solutions - correct answer ✔B
Q5: Which of these components is very likely to be instrumental to any disaster
recovery (DR) effort?
A. Routers
B. Laptops
C. Firewalls
D. Backups - correct answer ✔D
Q6: Which of the following is a subject?A. file
B. fence
C. filename
D. user - correct answer ✔D
Q7: Common network device used to connect networks?
A. Server
B. Endpoint
C. Router
D. Switch - correct answer ✔C
Q8: A common network device used to filter traffic?
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
, ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
A. Server
B. Endpoint
C. Ethernet
D. Firewal - correct answer ✔D
Q9: Who is responsible for publishing and signing the organization's policies?A.
The security office
B. Human resources
C. Senior management
D. The legal department - correct answer ✔C
Q10: A set of security controls or system settings used to ensure uniformity of
configuration through the IT environment?
A. Patches
B. Inventory
C. Baseline
D. Policy - correct answer ✔C
Q12: Mike is concerned that users on her network may be storing sensitive
information, such as Social Security numbers, on their hard drives without
proper authorization or security controls. What third-party security service can
she implement to BEST detect this activity?
A. IDS
B. IPS
C. DLP
D. TLS - correct answer ✔C
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ
⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ⪛⪴⪴⪷⪱⪘⪞⪴⪸ εΘΙΙμλΜιΙππππ ιΤΜΜτλμτΧ