ISC2 CERTIFIED IN CYBERSECURITY (CC) EXAM
NEWEST 2025 ACTUAL EXAM TEST BANK| 2
VERSIONS (VERSION A & B) WITH 700 REAL EXAM
QUESTIONS AND CORRECT DETAILED ANSWERS
(VERIFIED ANSWERS) GRADED A+| ISC2 CERTIFIED
IN CYBERSECURITY EXAM PREP 2025 (NEW!!)
ISC2 CERTIFIED IN CYBERSECURITY VERSION A
Zarma is an (ISC)² member and a security analyst for Triffid
Corporation. One of Zarma's colleagues is interested in getting an
(ISC)2 certification and asks Zarma what the test questions are like.
What should Zarma do?
A. Inform (ISC)2
B. Explain the style and format of the questions, but no detail
C. Inform the colleague's supervisor
D. Nothing - Correct Answer - B. Explain the style and format of the
questions, but no detail
Druna is a security practitioner tasked with ensuring that laptops are not
stolen from the organization's offices. Which sort of security control
would probably be best for this purpose?
A. Technical
B. Observe
C. Physical
D. Administrative - Correct Answer - C. Physical
pg. 1
,2|Page
For which of the following assets is integrity probably the most
important security aspect?
A. One frame of a streaming video
B. The file that contains passwords used to authenticate users
C. The color scheme of a marketing website
D. Software that checks the spelling of product descriptions for a retail
website - Correct Answer - B. The file that contains passwords used to
authenticate users
Jengi is setting up security for a home network. Jengi decides to
configure MAC address filtering on the router, so that only specific
devices will be allowed to join the network. This is an example of
a(n)_______ control.
A. Physical
B. Administrative
C. Substantial
D. Technical - Correct Answer - D. Technical
Siobhan is an (ISC)² member who works for Triffid Corporation as a
security analyst. Yesterday, Siobhan got a parking ticket while shopping
after work. What should Siobhan do?
A. Inform (ISC)2
B. Pay the parking ticket
C. Inform supervisors at Triffid
D. Resign employment from Triffid - Correct Answer - B. Pay the
parking ticket
pg. 2
,3|Page
Hoshi is an (ISC)² member who works for the Triffid Corporation as a
data manager. Triffid needs a new firewall solution, and Hoshi is asked
to recommend a product for Triffid to acquire and implement. Hoshi's
cousin works for a firewall vendor; that vendor happens to make the best
firewall available. What should Hoshi do?
A. Recommend a different vendor/product
B. Recommend the cousin's product
C. Hoshi should ask to be recused from the task
D. Disclose the relationship, but recommend the vendor/product -
Correct Answer - D. Disclose the relationship, but recommend the
vendor/product
Of the following, which would probably not be considered a threat?
A. Natural disaster
B. Unintentional damage to the system cause by a user
C. A laptop with sensitive data on it
D. An external attacker trying to gain unauthorized access to the
environment - Correct Answer - C. A laptop with sensitive data on it
Sophia is visiting Las Vegas and decides to put a bet on a particular
number on a roulette wheel. This is an example of _________.
A. Acceptance
B. Avoidance
C. Mitigation
D. Transference - Correct Answer - A. Acceptance
pg. 3
, 4|Page
In risk management concepts, a(n) ___________ is something or
someone that poses risk to an organization or asset.
A. Fear
B. Threat
C. Control
D. Asset - Correct Answer - B. Threat
Who approves the incident response policy?
A. (ISC)2
B. Senior management
C. The security manager
D. Investor - Correct Answer - B. Senior management
Which of the following are not typically involved in incident detection?
A. Users
B. Security analysts
C. Automated tools
D. Regulators - Correct Answer - D. Regulators
Prachi works as a database administrator for Triffid, Inc. Prachi is
allowed to add or delete users, but is not allowed to read or modify the
data in the database itself. When Prachi logs onto the system, an access
control list (ACL) checks to determine which permissions Prachi has.
In this situation, what is the database?
pg. 4