100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ISC2 CC FINAL EXAM 200 QUESTIONS AND CORRECT ANSWERS ALREADY GRADED A+

Rating
5.0
(7)
Sold
1
Pages
69
Grade
A+
Uploaded on
15-03-2025
Written in
2024/2025

ISC2 CC FINAL EXAM 200 QUESTIONS AND CORRECT ANSWERS ALREADY GRADED A+ ISC2 CC FINAL EXAM 200 QUESTIONS AND CORRECT ANSWERS ALREADY GRADED A+ ISC2 CC FINAL EXAM 200 QUESTIONS AND CORRECT ANSWERS ALREADY GRADED A+

Institution
ISC2 CC
Course
ISC2 CC











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISC2 CC
Course
ISC2 CC

Document information

Uploaded on
March 15, 2025
Number of pages
69
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISC2 CC FINAL EXAM 200 QUESTIONS AND CORRECT ANSWERS
ALREADY GRADED A+
Chad is a security practitioner tasked with ensuring that the information on the organization's public
website is not changed by anyone outside the organization. This task is an example of ensuring
_________. (D1, L1.1.1)

A)Confidentiality

B)Integrity

C)Availability

D)Confirmation - answer-B is correct. Preventing unauthorized modification is the definition of integrity.
A is incorrect because the website is not meant to be secret; it is open to the public. C is incorrect
because Chad is not tasked with ensuring the website is accessible, only that the information on it is not
changed. D is incorrect because "confirmation" is not a typical security term, and is used here only as a
distractor.



Druna is a security practitioner tasked with ensuring that laptops are not stolen from the organization's
offices. Which sort of security control would probably be best for this purpose? (D1, L1.3.1)

Question options:

A)Technical

B)Obverse

C)Physical

D)Administrative - answer-C is the best answer. Because laptops are tangible objects, and Druna is trying
to ensure that these objects are not moved from a certain place, physical controls are probably best for
the purpose. A is incorrect; technical controls might help detect an attempt to steal a laptop, or locate
the laptop after it has been stolen, but won't prevent the laptop from being taken. B is incorrect;
"obverse" is not a term commonly used to describe a particular type of security control, and is used here
only as a distractor. D is incorrect; administrative controls may help reduce theft, such as ensuring that
laptops are not left in a place unobserved, but won't prevent the laptop from being taken.



Which of the following is an example of a "something you know" authentication factor? (D1, L1.1.1)

Question options:

A)User ID

B)Password

C)Fingerprint

,D)Iris scan - answer-B is correct. A password is something the user knows and can present as an
authentication factor to confirm an identity assertion. A is incorrect because a user ID is an identity
assertion, not an authentication factor. C and D are incorrect as they are examples of authentication
factors that are something you are, also referred to as "biometrics."



Which of the following is an example of a "something you are" authentication factor? (D1, L1.1.1)

Question options:

A)A credit card presented to a cash machine

B)Your password and PIN

C)A user ID

D)A photograph of your face - answer-D is correct. A facial photograph is something you are—your
appearance. A is incorrect because a credit card is an example of an authentication factor that is
something you have. B is incorrect because passwords and PINs are examples of authentication factors
that are something you know. C is incorrect because a user ID is an identity assertion, not an
authentication factor.



A system that collects transactional information and stores it in a record in order to show which users
performed which actions is an example of providing ________. (D1, L1.1.1)

Question options:

A)Non-repudiation

B)Multifactor authentication

C)Biometrics

D)Privacy - answer-A is correct. Non-repudiation is the concept that users cannot deny they have
performed transactions that they did, in fact, conduct. A system that keeps a record of user transactions
provides non-repudiation. B and C are incorrect because nothing in the question referred to
authentication at all. D is incorrect because non-repudiation does not support privacy (if anything, non-
repudiation and privacy are oppositional).



Phrenal is selling a used laptop in an online auction. Phrenal has estimated the value of the laptop to be
$100, but has seen other laptops of similar type and quality sell for both more and less than that
amount. Phrenal hopes that the laptop will sell for $100 or more, but is prepared to take less for it if
nobody bids that amount. This is an example of ___________. (D1, L1.2.2)

Question options:

A)Risk tolerance

,B)Risk inversion

C)Threat

D)Vulnerability - answer-A is correct. Phrenal has decided there is an acceptable level of risk associated
with the online sale of the laptop; this is within Phrenal's risk tolerance. B is incorrect; "risk inversion" is
a term with no actual meaning, and is used here only as a distractor. C is incorrect; a threat is something
or someone that poses risk—the sale of the laptop does not pose risk to Phrenal, only a lesser or greater
benefit. D is incorrect; the sale of the laptop is not an avenue of attack against Phrenal.



In risk management concepts, a(n) _________ is something a security practitioner might need to
protect. (D1, L1.2.1)

Question options:

A)Vulnerability

B)Asset

C)Threat

D)Likelihood - answer-Hide question 7 feedback

B is correct. An asset is anything with value, and a security practitioner may need to protect assets. A, C,
and D are incorrect because vulnerabilities, threats and likelihood are terms associated with risk
concepts, but are not things that a practitioner would protect.



The Payment Card Industry (PCI) Council is a committee made up of representatives from major credit
card providers (Visa, Mastercard, American Express) in the United States. The PCI Council issues rules
that merchants must follow if the merchants choose to accept payment via credit card. These rules
describe best practices for securing credit card processing technology, activities for securing credit card
information, and how to protect customers' personal data. This set of rules is a _____. (D1, L1.4.2)

Question options:

A)Law

B)Policy

C)Standard

D)Procedure - answer-C is correct. This set of rules is known as the Data Security Standard, and it is
accepted throughout the industry. A is incorrect, because this set of rules was not issued by a
governmental body. B is incorrect, because the set of rules is not a strategic, internal document
published by senior leadership of a single organization. D is incorrect, because the set of rules is not
internal to a given organization and is not limited to a single activity.

, Preenka works at an airport. There are red lines painted on the ground next to the runway; Preenka has
been instructed that nobody can step or drive across a red line unless they request, and get specific
permission from, the control tower. This is an example of a(n)______ control. (D1, L1.3.1)

Question options:

A)Physical

B)Administrative

C)Critical

D)Technical - answer-B is correct. The process of requesting and getting permission, and the painted
signage, are examples of administrative controls. A is incorrect; while the line is painted on the ground
(and the ground is a tangible object), the line does not actually act to prevent or control anything—the
line is a symbol and indicator; Preenka could easily walk across the line, if Preenka chose to do so. C is
incorrect; "critical" is not a term commonly used to describe a particular type of security control, and is
used here only as a distractor. D is incorrect; a painted line is not an IT system or part of the IT
environment.



Of the following, which would probably not be considered a threat? (D1, L1.2.1)

Question options:

A)Natural disaster

B)Unintentional damage to the system caused by a user

C)A laptop with sensitive data on it

D)An external attacker trying to gain unauthorized access to the environment - answer-C is correct. A
laptop, and the data on it, are assets, not threats. All the other answers are examples of threats, as they
all have the potential to cause adverse impact to the organization and the organization's assets.



Glen is an (ISC)² member. Glen receives an email from a company offering a set of answers for an (ISC)²
certification exam. What should Glen do? (D1, L1.5.1)

Question options:

A)Nothing

B)Inform (ISC)²

C)Inform law enforcement

D)Inform Glen's employer - answer-B is correct. The (ISC)² Code of Ethics requires that members
"advance and protect the profession"; this includes protecting test security for (ISC)² certification
material. (ISC)² (and every (ISC)² member) has a vested interest in protecting test material, and
countering any entity that is trying to undermine the validity of the certifications. This is, however, not a
$25.49
Get access to the full document:
Purchased by 1 students

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Reviews from verified buyers

Showing all 7 reviews
3 months ago

3 months ago

3 months ago

3 months ago

3 months ago

8 months ago

8 months ago

5.0

7 reviews

5
7
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
JAYDEN254 Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
133
Member since
1 year
Number of followers
13
Documents
1912
Last sold
2 days ago
GOLD-RATED TOP SELLER ON STUVIA – YOUR TRUSTED HUB FOR EXCEPTIONAL STUDY RESOURCES! ACHIEVE MORE WITH EXPERTLY CRAFTED MATERIALS THAT GUARANTEE RESULTS!

GOLD-RATED TOP SELLER ON STUVIA – YOUR TRUSTED HUB FOR EXCEPTIONAL STUDY RESOURCES! ACHIEVE MORE WITH EXPERTLY CRAFTED MATERIALS THAT GUARANTEE RESULTS! Welcome to Your Ultimate Study Hub on Stuvia! As a Gold-Rated Top Seller with a proven reputation for excellence, I offer carefully curated, verified study materials designed to help you achieve remarkable academic success. With countless students benefiting from my 5-star rated resources, I am committed to providing clear, accurate, and comprehensive content that will guide you to your academic goals. Whether you\'re aiming for top grades, preparing for critical exams, or simply seeking reliable study aids, my collection of expertly crafted notes, summaries, and guides has you covered. I understand the importance of high-quality, dependable materials in your academic journey. That’s why every document in my store is thoughtfully created to meet your specific needs, ensuring you have the tools to succeed with confidence. Browse my store and take the first step toward academic excellence. Join thousands of satisfied students who have leveraged my resources to excel in their studies. Shop now and unlock the secret to achieving A+ results! Did my resources help you succeed? I’d love to hear about your experience! Please leave a review of your experience with our study documents.

Read more Read less
5.0

4199 reviews

5
4185
4
5
3
7
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions