WITH PRACTICE 250 QUESTIONS AND VERIFIED ANSWERS FOR 2025
OA AND EXAM PREP WITH MOST TESTED QUESTIONS GRADED A+
WGU C845 PREPARES STUDENTS FOR THE (ISC)² CERTIFIED IN CYBERSECURITY (CC) EXAM,
FOCUSING ON FOUNDATIONAL SECURITY KNOWLEDGE INCLUDING RISK MANAGEMENT,
NETWORK DEFENSE, INCIDENT RESPONSE, AND ACCESS CONTROL. THIS RESOURCE OFFERS
PRACTICE QUESTIONS AND CONCEPT REVIEWS ALIGNED WITH THE 2025 EXAM DOMAINS
AND OA STRUCTURE. IDEAL FOR STUDENTS PURSUING ENTRY-LEVEL CYBERSECURITY
CERTIFICATION AND CAREER READINESS.
A system that collects transactional information and stores it in a record in order to show which
users performed which actions is an example of providing . (D1, L1.1.1)
A) Non-repudiation
B) Multifactor authentication
C) Biometrics
D) Privacy - CORRECT ANSWER-A) Non-repudiation
In risk management concepts, a(n) is something or someone that poses risk to an
organization or asset. (D1, L1.2.1)
A) Fear
B) Threat
C) Control
D) Asset - CORRECT ANSWER-B) Threat
A software firewall is an application that runs on a device and prevents specific types of traffic from
entering that device. This is a type of control. (D1, L1.3.1)
A) Physical
B) Administrative
C) Passive
D) Technical - CORRECT ANSWER-D) Technical
Tina is an (ISC)² member and is invited to join an online group of IT security enthusiasts. After
attending a few online sessions, Tina learns that some participants in the group are sharing malware
,with each other, in order to use it against other organizations online. What should Tina do? (D1,
L1.5.1)
A) Nothing
B) Stop participating in the group
C) Report the group to law enforcement
D) Report the group to (ISC)² - CORRECT ANSWER-B) Stop participating in the group
What type of network is most often used to connect peripherals to computers and mobile devices?
A) Wi-Fi
B) Bluetooth
C) WAN
D) LAN - CORRECT ANSWER-B) Bluetooth
Which one of the following ports is not normally used by email systems?
A) 25
B) 139
C) 110
D) 143 - CORRECT ANSWER-B) 139 - NetBIOS
What technology provides the translation that assigns public IP addresses to privately addressed
systems that wish to communicate on the Internet?
A) TLS
B) HTTP
C) SSL
D) NAT - CORRECT ANSWER-D) NAT
What command may be used to determine the network path between two locations?
A) tracert
B) ping
C) arp
D) dig - CORRECT ANSWER-A) tracert
,Brad is configuring a new wireless network for his small business. What wireless security standard
should he use?
A) WPA
B) WEP2
C) WPA2
D) WEP - CORRECT ANSWER-C) WPA2
How many components does Malware have?
A) 1
B) 2
C) 4
D) 9 - CORRECT ANSWER-B) 2
1. Propagation Mechanism
2. Payload
What is the best way to protect against viruses?
A) User Education
B) Patching
C) NIDS
D) Fences - CORRECT ANSWER-A) User Education
steal computing power, network bandwidth, and storage capacity.
A) Blockchains
B) Virus
C) Botnets
D) Spyware - CORRECT ANSWER-C) Botnets
attacks exploit flaws in browsers and browser plugins.
A) Man-in-the-Browser
B) Man-in-the-Middle
, C) Man-in-the-Connection
D) Man-in-the-Know j- jCORRECT jANSWER-A) jMan-in-the-Browser
tricks jbrowsers jinto jusing junencrypted jcommunications.
A) Spoofing
B) SSL jStripping
C) HTTP jMasquerade
D) Detour jAttack j- jCORRECT jANSWER-B) jSSL jStripping
use jexternally jforced jerrors.
A) Fault jInjection jAttacks
B) Reverse jEngineering
C) SQL jInjections
D) XSS j- jCORRECT jANSWER-A) jFault jInjection jAttacks
What jtype jof jmalware jspreads junder jits jown jpower?
A) Worm
B) Spyware
C) Virus
D) Trojan jhorse j- jCORRECT jANSWER-A) jWorm
Which jone jof jthe jfollowing jtechniques jis juseful jin jpreventing jreplay jattacks?
A) Man-in-the-middle
B) Full jdisk jencryption
C) Session jtokens
D) Mobile jdevice jmanagement j- jCORRECT jANSWER-C) jSession jtokens
monitor jnetwork jtraffic jfor jsigns jof jmalicious jactivity.
A) IDS
B) Firewall
C) Anti-Virus