100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISC2 Certified in Cybersecurity (CC) Exam Prep Test Bank: 260+ Q&A with Detailed Explanations

Rating
-
Sold
-
Pages
283
Grade
A+
Uploaded on
15-08-2025
Written in
2025/2026

Ace Your ISC2 Certified in Cybersecurity (CC) Exam with Confidence! Are you preparing for the ISC2 CC certification and need a comprehensive, high-yield resource to ensure success? Look no further! This 260+ Question and Answer PDF is meticulously crafted to mirror the latest ISC2 CC exam format, complete with detailed explanations for each answer. What’s Inside? 260+ carefully curated exam-style questions Clear, concise explanations for every answer to deepen your understanding Covers all domains: Security Principles, Risk Management, Network Security, and more Perfect for self-study or last-minute revision Aligned with ISC2 CC 2024 syllabus

Show more Read less
Institution
ISC2
Module
ISC2











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 15, 2025
Number of pages
283
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • cc exam 2024 prep

Content preview

1|P a g e

,ISC2 CyberSecurity Exam Questions
100% Pass
Question: 1
Which access control is MORE effective at protecting a door against unauthorized access?
A. Fences
B. Turnstiles
C. Barriers
D. Locks

Answer: D
Explanation:
A lock is a device that prevents a physical structure (typically a door) from being opened,
indicating that only the authorized person (i.e. the person with the key) can open it. A
fence or a barrier will prevent ALL access. Turnstiles are physical barriers that can be
easily overcome (after all, it is common knowledge that intruders can easily jump over a
turnstile when no one is watching).

Question: 2
Which type of attack PRIMARILY aims to make a resource inaccessible to its intended
users?

A. Phishing
B. Denial of Service
C. Trojans
D. Cross-Site Scripting

Answer: B
Explanation:
A denial of service attack (DoS) consists in compromising the availability of a system or
service through a malicious overload of requests, which causes the activation of safety
mechanisms that delay or limit the availability of that system or service. Due to this,
systems or services are rendered inaccessible to their intended users. Trojans, phishing,
and cross-site scripting attacks try to covertly gain access to the system or data, and
therefore do not primarily aim at compromising the system's availability.

Question: 3
Which devices have the PRIMARY objective of collecting and analysing security events?




2|P a g e

,A. Firewalls
B. Hubs
C. Routers
D. SIEM

Answer: D

Explanation:
A Security Information and Event Management (SIEM) system is an application that
gathers security data from information system components and presents actionable
information through a unified interface. Routers and Hubs aim to receive and forward
traffic. Firewalls filter incoming traffic. Neither of these last three options aims at
collecting and analysing security events.

Question: 4

Which access control model specifies access to an object based on the subject's
role in the organization?

A. RBAC
B. MAC
C. ABAC
D. DAC
Answer: A
Explanation:
The role-based access control (RBAC) model is well known for governing access to
objects based on the roles of individual users within the organization. Mandatory access
control is based on security classifications. Attribute-based access control is based on
complex attribute rules. In discretionary access control, subjects can grant privileges to
other subjects and change some of the security attributes of the objects they have access
to.




3|P a g e

, Question: 5
When a company hires an insurance company to mitigate risk, which risk management
technique is being applied?

A. Risk transfer
B. Risk avoidance
C. Risk mitigation
D. Risk tolerance
Answer: A
Explanation:
Risk transfer is a risk management strategy that contractually shifts a pure risk from one
party to another (in this case, to an insurance company). Risk avoidance consists in stopping
activities and exposures that can negatively affect an organization and its assets. Risk
mitigation consists of mechanisms to reduce the risk. Finally, risk tolerance is the degree of
risk that an investor is willing to endure.

Question: 6
Which type of attack will most effectively provide privileged access (root access in
Unix/Linux platforms) to a computer while hiding its presence?

Rootkits
Phishing
Cross-Site Scripting
Trojans
Answer: A

Explanation:
A rootkit tries to maintain root-level access while concealing malicious activity. It
typically creates a backdoor and attempts to remain undetected by anti-malware software.
A rootkit is active while the system is running. Trojans can also create backdoors but are
only active while a specific application is running, and thus are not as effective as a
rootkit. Phishing is used to initiate attacks by redirecting the user to fake websites. Cross-
Site Scripting is used to attack websites.
Question: 7

Which device is used to connect a LAN to the Internet?

A. Router
B. Firewall
C. HIDS
D. SIEM


4|P a g e

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Topgraders Oxford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
12
Member since
8 months
Number of followers
2
Documents
274
Last sold
1 week ago

3.7

3 reviews

5
2
4
0
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions