WITH PRACTICE 250 QUESTIONS AND VERIFIED ANSWERS FOR 2025
OA AND EXAM PREP WITH MOST TESTED QUESTIONS GRADED A+
WGU C845 PREPARES STUDENTS FOR THE (ISC)² CERTIFIED IN CYBERSECURITY (CC) EXAM,
FOCUSING ON FOUNDATIONAL SECURITY KNOWLEDGE INCLUDING RISK MANAGEMENT,
NETWORK DEFENSE, INCIDENT RESPONSE, AND ACCESS CONTROL. THIS RESOURCE OFFERS
PRACTICE QUESTIONS AND CONCEPT REVIEWS ALIGNED WITH THE 2025 EXAM DOMAINS
AND OA STRUCTURE. IDEAL FOR STUDENTS PURSUING ENTRY-LEVEL CYBERSECURITY
CERTIFICATION AND CAREER READINESS.
A system that collects transactional information and stores it in a record in order to show which
users performed which actions is an example of providing ________. (D1, L1.1.1)
A) Non-repudiation
B) Multifactor authentication
C) Biometrics
D) Privacy - CORRECT ANSWER-A) Non-repudiation
In risk management concepts, a(n) ___________ is something or someone that poses risk to an
organization or asset. (D1, L1.2.1)
A) Fear
B) Threat
C) Control
D) Asset - CORRECT ANSWER-B) Threat
A software firewall is an application that runs on a device and prevents specific types of traffic from
entering that device. This is a type of ________ control. (D1, L1.3.1)
A) Physical
B) Administrative
C) Passive
D) Technical - CORRECT ANSWER-D) Technical
Tina is an (ISC)² member and is invited to join an online group of IT security enthusiasts. After
attending a few online sessions, Tina learns that some participants in the group are sharing malware
,with each other, in order to use it against other organizations online. What should Tina do? (D1,
L1.5.1)
A) Nothing
B) Stop participating in the group
C) Report the group to law enforcement
D) Report the group to (ISC)² - CORRECT ANSWER-B) Stop participating in the group
What type of network is most often used to connect peripherals to computers and mobile devices?
A) Wi-Fi
B) Bluetooth
C) WAN
D) LAN - CORRECT ANSWER-B) Bluetooth
Which one of the following ports is not normally used by email systems?
A) 25
B) 139
C) 110
D) 143 - CORRECT ANSWER-B) 139 - NetBIOS
What technology provides the translation that assigns public IP addresses to privately addressed
systems that wish to communicate on the Internet?
A) TLS
B) HTTP
C) SSL
D) NAT - CORRECT ANSWER-D) NAT
What command may be used to determine the network path between two locations?
A) tracert
B) ping
C) arp
D) dig - CORRECT ANSWER-A) tracert
,Brad is configuring a new wireless network for his small business. What wireless security standard
should he use?
A) WPA
B) WEP2
C) WPA2
D) WEP - CORRECT ANSWER-C) WPA2
How many components does Malware have?
A) 1
B) 2
C) 4
D) 9 - CORRECT ANSWER-B) 2
1. Propagation Mechanism
2. Payload
What is the best way to protect against viruses?
A) User Education
B) Patching
C) NIDS
D) Fences - CORRECT ANSWER-A) User Education
___________ steal computing power, network bandwidth, and storage capacity.
A) Blockchains
B) Virus
C) Botnets
D) Spyware - CORRECT ANSWER-C) Botnets
______________ attacks exploit flaws in browsers and browser plugins.
A) Man-in-the-Browser
B) Man-in-the-Middle
, C) Man-in-the-Connection
D) Man-in-the-Know - CORRECT ANSWER-A) Man-in-the-Browser
_________________ tricks browsers into using unencrypted communications.
A) Spoofing
B) SSL Stripping
C) HTTP Masquerade
D) Detour Attack - CORRECT ANSWER-B) SSL Stripping
________________________ use externally forced errors.
A) Fault Injection Attacks
B) Reverse Engineering
C) SQL Injections
D) XSS - CORRECT ANSWER-A) Fault Injection Attacks
What type of malware spreads under its own power?
A) Worm
B) Spyware
C) Virus
D) Trojan horse - CORRECT ANSWER-A) Worm
Which one of the following techniques is useful in preventing replay attacks?
A) Man-in-the-middle
B) Full disk encryption
C) Session tokens
D) Mobile device management - CORRECT ANSWER-C) Session tokens
_________________ monitor network traffic for signs of malicious activity.
A) IDS
B) Firewall
C) Anti-Virus