100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ISC2 CERTIFIED IN CYBERSECURITY (CC): 2025–2026 PRACTICE EXAM QUESTIONS WITH MOST TESTED QUESTIONS (HARVARD STYLE)

Rating
-
Sold
-
Pages
35
Grade
A+
Uploaded on
26-06-2025
Written in
2024/2025

ISC2 CERTIFIED IN CYBERSECURITY (CC): 2025–2026 PRACTICE EXAM QUESTIONS WITH MOST TESTED QUESTIONS (HARVARD STYLE) ISC2 CERTIFIED IN CYBERSECURITY (CC): 2025–2026 PRACTICE EXAM QUESTIONS WITH MOST TESTED QUESTIONS (HARVARD STYLE)

Institution
ISC2 CERTIFIED IN CYBERSECURITY : 2025–2026 PR
Course
ISC2 CERTIFIED IN CYBERSECURITY : 2025–2026 PR











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISC2 CERTIFIED IN CYBERSECURITY : 2025–2026 PR
Course
ISC2 CERTIFIED IN CYBERSECURITY : 2025–2026 PR

Document information

Uploaded on
June 26, 2025
Number of pages
35
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISC2 CERTIFIED IN CYBERSECURITY (CC): 2025–2026 PRACTICE EXAM
QUESTIONS WITH MOST TESTED QUESTIONS (HARVARD STYLE)
INCLUDES 2025–2026 UPDATED PRACTICE QUESTIONS FOR THE ISC2 CERTIFIED IN CYBERSECURITY
(CC) EXAM. COVERS ALL DOMAINS: SECURITY PRINCIPLES, ACCESS CONTROL, NETWORK SECURITY,
INCIDENT RESPONSE, AND SECURITY OPERATIONS. QUESTIONS ARE BASED ON THE MOST
COMMONLY TESTED CONCEPTS AND INCLUDE HARVARD STYLE REFERENCING



A vendor sells a particular operating system (OS). In order to deploy the OS securely on different
platforms, the vendor publishes several sets of instructions on how to install it, depending on which
platform the customer is using. This is an example of ______.

A. Law

B. Procedure

C. Standard

D. Policy - CORRECT ANSWER-B. Procedure



The city of Grampon wants to know where all its public vehicles (garbage trucks, police cars, etc.) are
at all times, so the city has GPS transmitters installed in all the vehicles. What kind of control is this?

A. Administrative

B. Entrenched

C. Physical

D. Technical - CORRECT ANSWER-D. Technical



What is the risk associated with resuming full normal operations too soon after a DR effort?

A. The danger posed by the disaster might still be present

B. Investors might be upset

C. Regulators might disapprove

D. The organization could save money - CORRECT ANSWER-A. The danger posed by the disaster
might still be present



All of the following are important ways to practice an organization disaster recovery (DR) effort;
which one is the most important?

A. Practice restoring data from backups

B. Facility evacuation drills

,C. Desktop/tabletop testing of the plan

D. Running the alternate operating site to determine if it could handle critical function in time of
emergency - CORRECT ANSWER-B. Facility evacuation drills



Which of the following is likely to be included in the business continuity plan?

A. Alternate work areas for personnel affected by a natural disaster

B. The organization's approach security approach

C. Last year's budget information

D. Log data from all systems - CORRECT ANSWER-A. Alternate work areas for personnel affected
by a natural disaster



What is the overall objective of a disaster recovery (DR) effort?

A. Save money

B. Return to normal, full operations

C. Preserve critical business functions during a disaster

D. Enhance public perception of the organization - CORRECT ANSWER-B. Return to normal, full
operations



An attacker outside the organization attempts to gain access to the organization's internal files. This
is an example of a(n) ______.

A. Intrusion

B. Exploit

C. Disclosure

D. Publication - CORRECT ANSWER-A. Intrusion



What is the goal of Business Continuity efforts?

A. Save money

B. Impress customers

C. Ensure all IT system continue to operate

D. Keep critical business functions operational - CORRECT ANSWER-D. Keep critical business
functions operational

,Which of the following will have the most impact on determining the duration of log retention?

A. Personnel preference

B. Applicable laws

C. Industry standards

D. Types of storage media - CORRECT ANSWER-B. Applicable laws



Handel is a senior manager at Triffid, Inc., and is in charge of implementing a new access control
scheme for the company. Handel wants to ensure that operational managers have the utmost
personal choice in determining which employees get access to which systems/data. Which method
should Handel select?

A. Role-based access control (RBAC)

B. Mandatory access control (MAC)

C. Discretionary access control (DAC)

D. Security policy - CORRECT ANSWER-C. Discretionary access controls (DAC)



Which of the following is not an appropriate control to add to privileged accounts?

A. Increased logging

B. Multifactor authentication

C. Increased auditing

D. Security deposit - CORRECT ANSWER-D. Security deposit



Prachi works as a database administrator for Triffid, Inc. Prachi is allowed to add or delete users, but
is not allowed to read or modify the data in the database itself. When Prachi logs onto the system, an
access control list (ACL) checks to determine which permissions Prachi has.

In this situation, what is the ACL?

A. The subject

B. The object

C. The rule

D. The firmware - CORRECT ANSWER-C. The rule



All visitors to a secure facility should be _______.

A. Fingerprinted

, B. Photographed

C. Escorted

D. Required to wear protective equipment - CORRECT ANSWER-C. Escorted



Which of these is an example of a physical access control mechanism?

A. Software-based firewall at the perimeter of the network

B. A lock on a door

C. Network switches that filter according to MAC addresses

D. A process that requires two people to act at the same time to perform a function - CORRECT
ANSWER-B. A lock on a door


Network traffic originating from outside the organization might be admitted to the internal IT
environment or blocked at the perimeter by a ________.

A. Turnstile

B. Fence

C. Vacuum

D. Firewall - CORRECT ANSWER-D. Firewall



Trina is a security practitioner at Triffid, Inc. Trina has been tasked with selecting a new product to
serve as a security control in the environment. After doing some research, Trina selects a particular
product. Before that product can be purchased, a manager must review Trina's selection and
determine whether to approve the purchase. This is a description of:

A. Two-person integrity

B. Segregation of duties

C. Software

D. Defense in depth - CORRECT ANSWER-B. Segregation of duties



All of the following are typically perceived as drawbacks to biometric systems, except:

A. Lack of accuracy

B. Potential privacy concerns

C. Retention of physiological data past the point of employment

D. Legality - CORRECT ANSWER-A. Lack of accuracy

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
JAMES125 Chamberlain College Of Nursng
View profile
Follow You need to be logged in order to follow users or courses
Sold
339
Member since
2 year
Number of followers
42
Documents
3230
Last sold
1 week ago
MY MAIN GOAL IS TO MAKE YOU PASS GOOD LUCK

MY MAIN GOAL IS TO MAKE YOU PASS GOOD LUCK. As a dedicated nursing student with a passion for helping peers succeed, I specialize in providing high-quality study resources on STUVIA including ATI modules and other essential certifications, earning excellent ratings and a stellar reputation for boosting students' grades. My commitment to excellence

5.0

3104 reviews

5
3016
4
47
3
27
2
6
1
8

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions