100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISC2 CC Exam ACTUAL QUESTIONS AND CORRECT ANSWERS

Rating
-
Sold
-
Pages
45
Grade
A+
Uploaded on
24-11-2025
Written in
2025/2026

ISC2 CC Exam ACTUAL QUESTIONS AND CORRECT ANSWERS Port 21 - File Transfer Protocol (FTP) Port 22 - Secure Shell (SSH) Port 3389 - Remote Desktop Protocol (RDP) Ports 137, 138, 139 - Ne

Institution
ISC2 CC
Course
ISC2 CC











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISC2 CC
Course
ISC2 CC

Document information

Uploaded on
November 24, 2025
Number of pages
45
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

ISC2 CC Exam ACTUAL QUESTIONS
AND CORRECT ANSWERS
If two people want to use symmetric encryption to conduct a confidential
conversation, how many keys do they need?


A. 1
B. 8
C. 3
D. None - CORRECT ANSWERS A is correct


Hoshi is an (ISC)2 member who works for the Triffid Corporation as a data
manager. Triffid needs a new firewall solution, and Hoshi is asked to
recommend a product for Triffid to acquire and implement. Hoshi's cousin
works for a firewall
vendor; that vendor happens to make the best firewall available. What should
Hoshi do?


A. Recommend the cousin's product
B. Hoshi should ask to be recused from the task
C. Disclose the relationship, but recommend the vendor/product
D. Recommend a different vendor/product - CORRECT ANSWERS C is
correct


As an IT Security professional, you are expected to perform due care. What
does this mean?
Response:


A. Continue the security practices of your company.
B. Apply patches annually.

,C. Do what is right in the situation and your job. Act on the knowledge.
D. Researching and acquiring the knowledge to do your job right. - CORRECT
ANSWERS C is correct


Handel is a senior manager at Triffid, Inc., and is in charge of implementing a
new access control scheme for the company. Handel wants to ensure that
employees transferring from one department to another, getting promoted, or
cross-training to new positions can get access to the different assets they'll need
for their new positions, in the most efficient manner. Which method should
Handel select?


A. Role-based access control (RBAC)
B. Barbed wire
C. Mandatory access control (MAC)
D. Discretionary access control (DAC) - CORRECT ANSWERS A is
correct


For which of the following assets is integrity probably the most important
security aspect?


A. The file that contains passwords used to authenticate users
B. Software that checks the spelling of product descriptions for a retail website
C. The color scheme of a marketing website
D. One frame of a streaming video - CORRECT ANSWERS A is correct


Which of the following are not typically involved in incident detection?


A. Regulators
B. Automated tools
C. Security analysts

,D. Users - CORRECT ANSWERS A is correct


Which of the following is an example of a "something you know' authentication
factor?


A. Password
B. Iris scan
C. User ID
D. Fingerprint - CORRECT ANSWERS A is correct


_________is used to ensure that configuration management activities are
effective and enforced.
A. Inventory
B. Baseline
C. Verification and audit
D. Identification - CORRECT ANSWERS C is correct


In order for a biometric security to function properly, an authorized person's
physiological data must be__________


A. Modified
B. Stored
C. Deleted
D. Broadcast - CORRECT ANSWERS B is correct


A ________is a record of something that has occurred.


A. Log

, B. Law
C. Firewall
D. Biometric - CORRECT ANSWERS A is correct


"Wiring_________ "is a common term meaning "a place where wires/conduits
are often run, and equipment can be placed, in order to facilitate the use of local
networks."


A. Shelf
B. Closet
C. House
D. Bracket - CORRECT ANSWERS B is correct


Hashing is often used to provide_________


A. Confidentiality
B. Integrity
C. Availability
D. Value - CORRECT ANSWERS B is correct


Handel is a senior manager at Triffid, Inc., and is in charge of implementing a
new access control scheme for the company. Handel wants to ensure that
employees who are assigned to new positions in the company do not retain
whatever
access they had in their old positions. Which method should Handel select?


A. Mandatory access controls (MAC)
B. Role-based access controls (RBAC)
C. Logging
$9.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
nzomokelvin15

Get to know the seller

Seller avatar
nzomokelvin15 Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
4 months
Number of followers
0
Documents
1511
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions