100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

(ISC) 2 Certified in Cybersecurity – Exam Prep | Latest 2025/2026 Practice Questions & Study Guide

Rating
-
Sold
-
Pages
69
Grade
A+
Uploaded on
16-12-2025
Written in
2025/2026

Prepare confidently for the (ISC)² Certified in Cybersecurity (CC) Exam with this fully updated 2025/2026 Exam Prep & Practice Question Guide. Designed for cybersecurity students, IT professionals, and certification candidates, this resource provides exam-aligned practice questions, verified correct answers, and detailed rationales covering all core cybersecurity domains. This guide focuses on network security, risk management, threat detection, cryptography, and governance, making it ideal for self-study, practice testing, and final exam preparation. What’s Included ️ Latest 2025/2026 (ISC)² Certified in Cybersecurity exam-style questions ️ Verified answers with clear explanations ️ Core domains: security principles, network security, risk management, and incident response ️ Threats, vulnerabilities, and mitigation strategies ️ Security governance, compliance, and policies ️ High-yield practice questions for exam readiness ️ Ideal for structured review and final prep Perfect For (ISC)² CC exam candidates IT & cybersecurity students and professionals Entry-level security certification aspirants Anyone seeking updated, exam-aligned (ISC)² cybersecurity practice questions This study guide helps you reinforce critical concepts, identify weak areas, and confidently approach the (ISC)² Certified in Cybersecurity exam.

Show more Read less
Institution
2 Certified In Cybersecurity
Course
2 Certified in Cybersecurity











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
2 Certified in Cybersecurity
Course
2 Certified in Cybersecurity

Document information

Uploaded on
December 16, 2025
Number of pages
69
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

(ISC) 2 Certified in Cybersecurity – Exam Prep |
Latest 2025/2026 Practice Questions & Study
Guide
Document specific requirements that a customer has about any aspect of a vendor's
service performance.

A) DLR
B) Contract
C) SLR
D) NDA - correct answerC) SLR (Service-Level Requirements)

_________ identifies and triages risks. - correct answerRisk Assessment

_________ are external forces that jeopardize security. - correct answerThreats

_________ are methods used by attackers. - correct answerThreat Vectors

_________ are the combination of a threat and a vulnerability. - correct answerRisks

We rank risks by _________ and _________. - correct answerLikelihood and impact

_________ use subjective ratings to evaluate risk likelihood and impact. - correct
answerQualitative Risk Assessment

_________ use objective numeric ratings to evaluate risk likelihood and impact. -
correct answerQuantitative Risk Assessment

_________ analyzes and implements possible responses to control risk. - correct
answerRisk Treatment

_________ changes business practices to make a risk irrelevant. - correct answerRisk
Avoidance

_________ reduces the likelihood or impact of a risk. - correct answerRisk Mitigation

An organization's _________ is the set of risks that it faces. - correct answerRisk Profile

_________ Initial Risk of an organization. - correct answerInherent Risk

_________ Risk that remains in an organization after controls. - correct answerResidual
Risk

,_________ is the level of risk an organization is willing to accept. - correct answerRisk
Tolerance

_________ reduce the likelihood or impact of a risk and help identify issues. - correct
answerSecurity Controls

_________ stop a security issue from occurring. - correct answerPreventive Control

_________ identify security issues requiring investigation. - correct answerDetective
Control

_________ remediate security issues that have occurred. - correct answerRecovery
Control

Hardening == Preventative - correct answerVirus == Detective

Backups == Recovery - correct answerFor exam (Local and Technical Controls are the
same)

_________ use technology to achieve control objectives. - correct answerTechnical
Controls

_________ use processes to achieve control objectives. - correct answerAdministrative
Controls

_________ impact the physical world. - correct answerPhysical Controls

_________ tracks specific device settings. - correct answerConfiguration Management

_________ provide a configuration snapshot. - correct answerBaselines (track changes)

_________ assigns numbers to each version. - correct answerVersioning

_________ serve as important configuration artifacts. - correct answerDiagrams

_________ and _________ help ensure a stable operating environment. - correct
answerChange and Configuration Management

Purchasing an insurance policy is an example of which risk management strategy? -
correct answerRisk Transference

What two factors are used to evaluate a risk? - correct answerLikelihood and Impact

What term best describes making a snapshot of a system or application at a point in
time for later comparison? - correct answerBaselining

,What type of security control is designed to stop a security issue from occurring in the
first place? - correct answerPreventive

What term describes risks that originate inside the organization? - correct
answerInternal

What four items belong to the security policy framework? - correct answerPolicies,
Standards, Guidelines, Procedures

_________ describe an organization's security expectations. - correct answerPolicies
(mandatory and approved at the highest level of an organization)

_________ describe specific security controls and are often derived from policies. -
correct answerStandards (mandatory)

_________ describe best practices. - correct answerGuidelines
(recommendations/advice and compliance is not mandatory)

_________ step-by-step instructions. - correct answerProcedures (not mandatory)

_________ describe authorized uses of technology. - correct answerAcceptable Use
Policies (AUP)

_________ describe how to protect sensitive information. - correct answerData
Handling Policies

_________ cover password security practices. - correct answerPassword Policies

_________ cover use of personal devices with company information. - correct
answerBring Your Own Device (BYOD) Policies

_________ cover the use of personally identifiable information. - correct answerPrivacy
Policies

_________ cover the documentation, approval, and rollback of technology changes. -
correct answerChange Management Policies

Which element of the security policy framework includes suggestions that are not
mandatory? - correct answerGuidelines

What law applies to the use of personal information belonging to European Union
residents? - correct answerGDPR

What type of security policy normally describes how users may access business
information with their own devices? - correct answerBYOD Policy

, _________ the set of controls designed to keep a business running in the face of
adversity, whether natural or man-made. - correct answerBusiness Continuity Planning
(BCP)

BCP is also known as _________. - correct answerContinuity of Operations Planning
(COOP)

Defining the BCP Scope: - correct answerWhat business activities will the plan cover?
What systems will it cover? What controls will it consider?

_________ identifies and prioritizes risks. - correct answerBusiness Impact Assessment

BCP in the cloud requires _________ between providers and customers. - correct
answerCollaboration

_________ protects against the failure of a single component. - correct
answerRedundancy

_________ identifies and removes SPOFs. - correct answerSingle Point of Failure
Analysis

_________ continues until the cost of addressing risks outweighs the benefit. - correct
answerSPOF Analysis

_________ uses multiple systems to protect against service failure. - correct
answerHigh Availability

_________ makes a single system resilient against technical failures. - correct
answerFault Tolerance

_________ spreads demand across systems. - correct answerLoad Balancing

3 Common Points of Failure in a system. - correct answerPower Supply, Storage Media,
Networking

Disk Mirroring is which RAID level? - correct answer1

Disk striping with parity is which RAID level? - correct answer5 (uses 3 or more disks to
store data)

What goal of security is enhanced by a strong business continuity program? - correct
answerAvailability

What is the minimum number of disk required to perform RAID level 5? - correct
answer3

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Successscore Phoenix University
View profile
Follow You need to be logged in order to follow users or courses
Sold
29
Member since
4 months
Number of followers
1
Documents
1585
Last sold
7 hours ago
Ultimate Study Resource | Nursing, HESI, ATI, TEAS, Business & More

Welcome to your one-stop exam prep store!

2.8

4 reviews

5
0
4
2
3
0
2
1
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions