100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ISC2 Certified in Cybersecurity (CC) Exam Prep Graded A+

Rating
-
Sold
-
Pages
25
Grade
A+
Uploaded on
28-08-2025
Written in
2025/2026

ISC2 Certified in Cybersecurity (CC) Exam Prep Graded A+ ______ is used to ensure that configuration management activities are effective and enforced. A. Inventory B. Baseline C. Identification D. Verification and audit - ANSWER-D. Verification and audit "Wiring _____" is a common term meaning "a place where wires/conduits are often run, and equipment can be placed, in order to facilitate the use of local networks." A. Shelf B. Closet C. Bracket D. House - ANSWER-B. Closet

Show more Read less
Institution
ISC2 Certified In Cybersecurity
Course
ISC2 Certified in Cybersecurity










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISC2 Certified in Cybersecurity
Course
ISC2 Certified in Cybersecurity

Document information

Uploaded on
August 28, 2025
Number of pages
25
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISC2 Certified in Cybersecurity (CC)
Exam Prep Graded A+
______ is used to ensure that configuration management activities are effective and
enforced.
A. Inventory
B. Baseline
C. Identification
D. Verification and audit - ANSWER-D. Verification and audit

"Wiring _____" is a common term meaning "a place where wires/conduits are often run,
and equipment can be placed, in order to facilitate the use of local networks."
A. Shelf
B. Closet
C. Bracket
D. House - ANSWER-B. Closet

(ISC)² publishes a Common Body of Knowledge (CBK) that IT security practitioners
should be familiar with; this is recognized throughout the industry as a set of material
that is useful for practitioners to refer to. Certifications can be issued for demonstrating
expertise in this Common Body of Knowledge. What kind of document is the Common
Body of Knowledge?
A. Policy
B. Procedure
C. Standard
D. Law - ANSWER-C. Standard

A _____ is a record of something that has occurred.
A. Biometric
B. Law
C. Log
D. Firewall - ANSWER-C. Log

A bollard is a post set securely in the ground in order to prevent a vehicle from entering
an area or driving past a certain point. Bollards are an example of ______ controls.
A. Physical
B. Administrative
C. Drastic
D. Technical - ANSWER-A. Physical

A device that filters network traffic in order to enhance overall security/performance.
A. Endpoint
B. Laptop
C. MAC (media access control)

,D. Firewall - ANSWER-D. Firewall

A device that is commonly useful to have on the perimeter between two networks.
A. User laptop
B. IoT
C. Camera
D. Firewall - ANSWER-D. Firewall

A device typically accessed by multiple users, often intended for a single purpose, such
as managing email or web pages.
A. Router
B. Switch
C. Server
D. Laptop - ANSWER-C. Server

A human guard monitoring a hidden camera could be considered a ______ control.
A. Detective
B. Preventive
C. Deterrent
D. Logical - ANSWER-A. Detective

A means to allow remote users to have secure access to the internal IT environment.
A. Internet
B. VLAN
C. MAC
D. VPN - ANSWER-D. VPN

A software firewall is an application that runs on a device and prevents specific types of
traffic from entering that device. This is a type of ________ control.
A. Physical
B. Administrative
C. Passive
D. Technical - ANSWER-D. Technical

A system that collects transactional information and stores it in a record in order to show
which users performed which actions is an example of providing ________.
A. Non-repudiation
B. Multifactor authentication
C. Biometrics
D. Privacy - ANSWER-A. Non-repudiation

A tool that aggregates log data from multiple sources, and typically analyzes it and
reports potential threats.
A. HIDS
B. Anti-malware
C. Router

, D. SIEM - ANSWER-D. SIEM

A tool that filters inbound traffic to reduce potential threats.
A. NIDS (network-based intrusions-detection systems)
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER-D. Firewall

A tool that inspects outbound traffic to reduce potential threats.
A. NIDS (network-based intrusion-detection systems)
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER-C. DLP (data loss provention)

A tool that monitors local devices to reduce potential threats from hostile software.
A. NIDS (network-based intrusion-detection systems
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER-B. Anti-malware

A vendor sells a particular operating system (OS). In order to deploy the OS securely on
different platforms, the vendor publishes several sets of instructions on how to install it,
depending on which platform the customer is using. This is an example of ______.
A. Law
B. Procedure
C. Standard
D. Policy - ANSWER-B. Procedure

A VLAN is a _____ method of segmenting networks.
A. Secret
B. Physical
C. Regulated
D. Logical - ANSWER-D. Logical

All of the following are important ways to practice an organization disaster recovery
(DR) effort; which one is the most important?
A. Practice restoring data from backups
B. Facility evacuation drills
C. Desktop/tabletop testing of the plan
D. Running the alternate operating site to determine if it could handle critical function in
time of emergency - ANSWER-B. Facility evacuation drills

All of the following are typically perceived as drawbacks to biometric systems, except:
A. Lack of accuracy
B. Potential privacy concerns
C. Retention of physiological data past the point of employment

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
CLOUND Exam
View profile
Follow You need to be logged in order to follow users or courses
Sold
601
Member since
2 year
Number of followers
389
Documents
10866
Last sold
4 days ago
PROF MM

HELLO WELCOME TO THIS PAGE WHERE YOU WILL FIND ALL EXAMS ,STUDY GUIDE ,CASE, TESTBANKS AND ANY OTHER STUDY MATERIALS,

3.9

116 reviews

5
58
4
16
3
29
2
3
1
10

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions