100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISC2 Certified in Cybersecurity (CC) Exam Domain 1 - Security Principles questions with answers

Rating
-
Sold
-
Pages
34
Grade
A+
Uploaded on
09-01-2026
Written in
2025/2026

ISC2 Certified in Cybersecurity (CC) Exam Domain 1 - Security Principles questions with answers

Institution
ISC2 Certified In Cybersecurity
Course
ISC2 Certified in Cybersecurity











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISC2 Certified in Cybersecurity
Course
ISC2 Certified in Cybersecurity

Document information

Uploaded on
January 9, 2026
Number of pages
34
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

2



ISC2 Certified in Cybersecurity (CC) Exam Domain 1 -
|| || || || || || || || ||




Security Principles questions with answers || || || ||




Information Security ||




Security that focuses on all of our information. This includes paper documents, voice information,
|| || || || || || || || || || || || ||




data, knowledge.
|| ||




IT security
||




Security that focuses on the hardware and software. THis includes Computers, servers, networks,
|| || || || || || || || || || || || ||




hardware, software, and data being communicated.
|| || || || ||




Cybersecurity
Everything from IT security that is accessible on the web.
|| || || || || || || || ||




Confidentiality
the act of holding information in confidence, not to be released to unauthorized individuals
|| || || || || || || || || || || || ||




Integrity
How we protect modifications of the data and the systems to ensure data has not been altered.
|| || || || || || || || || || || || || || || ||




Availability
Ensure authorized people can access the data they need when they need ti
|| || || || || || || || || || || ||

,2




Applications for Confidentiality || ||




- Encryption for Data at rest, full disk encyption
|| || || || || || || ||




- Secure transport encryption protocols for data-in-motion (SSL, TLS or IPSEC)
|| || || || || || || || || ||




Best practices for data-in-use
|| || ||




- Clean Desk
|| ||




- No shoulder surfin
|| || ||




- Screen view angle protector
|| || || ||




- PC Locking
|| ||




Other factors of confidentiality
|| || ||




- Strong Passwords
|| ||




- MFA
||




- Masking
||




- Access Control
|| ||




- Need-to-know
||




- Least Privilege
|| ||




Threats to Confidentiality || ||




- Attacks on encryption (cryptoanalysis)
|| || || ||




- Social Engineering
|| ||




- Key Loggers
|| ||




- Cameras
||




- Steganography
||

,2


- Internet of Things (IOT) devices
|| || || || ||




Applications for Integrity || ||




- Cryptography
||




- Check Sums
|| ||




- Message Digests
|| ||




- Digital Signatures
|| ||




- Non Repudiation
|| ||




- Access Control
|| ||




Threats to Integrity || ||




- Alternations of data
|| || ||




- Code Injections
|| ||




- Cryptoanalysis
||




Applications for Availability || ||




- IPS / IDS
|| || ||




- Patch Management
|| ||




- Redunancy on hardware power
|| || || ||




- Disks (RAID)
|| ||




- Traffic Paths
|| ||




- Service Level Agreement (SLA)
|| || || ||




Threats to Availability || ||

, 2


- Malicious attacks (DDOS, physical, system, compromise, staff)
|| || || || || || ||




- Application failures
|| ||




- Component failure
|| ||




The DAD Triad
|| ||




Disclosure;
Alteration; and, ||




Destruction.




Disclosure
Someone not authorized to access certain information
|| || || || || ||




Alteration
Data has been changed
|| || ||




Destruction
Data or systems have been destroyed or have become inaccessible
|| || || || || || || || ||




IAAA
Identification, authentication, authorization, accountability
|| || ||




Identification

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ruiz Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
84
Member since
1 year
Number of followers
1
Documents
12239
Last sold
3 days ago
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.2

9 reviews

5
3
4
1
3
2
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions