100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ISC2 Certified In Cybersecurity (CC) Practice Exam Questions with correct Answers (A+ GRADED 100% VERIFIED) 2025/2026

Rating
-
Sold
-
Pages
27
Grade
A+
Uploaded on
10-09-2025
Written in
2025/2026

ISC2 Certified In Cybersecurity (CC) Practice Exam Questions with correct Answers (A+ GRADED 100% VERIFIED) 2025/2026

Institution
ISC2 Certified In Cybersecurity
Course
ISC2 Certified In Cybersecurity










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISC2 Certified In Cybersecurity
Course
ISC2 Certified In Cybersecurity

Document information

Uploaded on
September 10, 2025
Number of pages
27
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISC2 Certified In Cybersecurity (CC)
Practice Exam Questions with correct
Answers (A+ GRADED 100%
VERIFIED)
______ is used to ensure that configuration management activities are effective and
enforced.
A. Inventory
B. Baseline
C. Identification
D. Verification and audit - ANSWER: D. Verification and audit

"Wiring _____" is a common term meaning "a place where wires/conduits are often
run, and equipment can be placed, in order to facilitate the use of local networks."
A. Shelf
B. Closet
C. Bracket
D. House - ANSWER: B. Closet

(ISC)² publishes a Common Body of Knowledge (CBK) that IT security practitioners
should be familiar with; this is recognized throughout the industry as a set of material
that is useful for practitioners to refer to. Certifications can be issued for
demonstrating expertise in this Common Body of Knowledge. What kind of document
is the Common Body of Knowledge?
A. Policy
B. Procedure
C. Standard
D. Law - ANSWER: C. Standard

A _____ is a record of something that has occurred.
A. Biometric
B. Law
C. Log
D. Firewall - ANSWER: C. Log

A bollard is a post set securely in the ground in order to prevent a vehicle from
entering an area or driving past a certain point. Bollards are an example of ______
controls.
A. Physical

,B. Administrative
C. Drastic
D. Technical - ANSWER: A. Physical

A device that filters network traffic in order to enhance overall security/performance.
A. Endpoint
B. Laptop
C. MAC (media access control)
D. Firewall - ANSWER: D. Firewall

A device that is commonly useful to have on the perimeter between two networks.
A. User laptop
B. IoT
C. Camera
D. Firewall - ANSWER: D. Firewall

A device typically accessed by multiple users, often intended for a single purpose,
such as managing email or web pages.
A. Router
B. Switch
C. Server
D. Laptop - ANSWER: C. Server

A human guard monitoring a hidden camera could be considered a ______ control.
A. Detective
B. Preventive
C. Deterrent
D. Logical - ANSWER: A. Detective

A means to allow remote users to have secure access to the internal IT environment.
A. Internet
B. VLAN
C. MAC
D. VPN - ANSWER: D. VPN

A software firewall is an application that runs on a device and prevents specific types
of traffic from entering that device. This is a type of ________ control.
A. Physical
B. Administrative
C. Passive
D. Technical - ANSWER: D. Technical

A system that collects transactional information and stores it in a record in order to
show which users performed which actions is an example of providing ________.

, A. Non-repudiation
B. Multifactor authentication
C. Biometrics
D. Privacy - ANSWER: A. Non-repudiation

A tool that aggregates log data from multiple sources, and typically analyzes it and
reports potential threats.
A. HIDS
B. Anti-malware
C. Router
D. SIEM - ANSWER: D. SIEM

A tool that filters inbound traffic to reduce potential threats.
A. NIDS (network-based intrusions-detection systems)
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER: D. Firewall

A tool that inspects outbound traffic to reduce potential threats.
A. NIDS (network-based intrusion-detection systems)
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER: C. DLP (data loss provention)

A tool that monitors local devices to reduce potential threats from hostile software.
A. NIDS (network-based intrusion-detection systems
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER: B. Anti-malware

A vendor sells a particular operating system (OS). In order to deploy the OS securely
on different platforms, the vendor publishes several sets of instructions on how to
install it, depending on which platform the customer is using. This is an example of
______.
A. Law
B. Procedure
C. Standard
D. Policy - ANSWER: B. Procedure

A VLAN is a _____ method of segmenting networks.
A. Secret
B. Physical
C. Regulated
D. Logical - ANSWER: D. Logical
$11.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
gradepapers465
3.0
(1)

Get to know the seller

Seller avatar
gradepapers465 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
5
Member since
3 months
Number of followers
0
Documents
747
Last sold
2 days ago

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions