100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISC2 CYBERSECURITY CERTIFICATION (CC) EXAM 2025 QUESTIONS AND ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
79
Cijfer
A+
Geüpload op
05-08-2025
Geschreven in
2025/2026

Which access control is more effective at protecting a door against unauthorized access? A. Fences B. Turnstiles C. Barriers D. Locks - ANS D. Locks A lock is a device that prevents a physical structure (typically a door) from being opened, indicating that only the authorized person (i.e. the person with the key) can open it. A fence or a barrier will prevent ALL access. Turnstiles are physical barrier that can easily overcome (after all, it is common knowledge that intruders can easily jump over a turnstile when no one is watching). Which type of attack PRIMARILY aims to make a resource inaccessible to its intended users? A. Phishing B. Denial of Service C. Trojans D. Cross-site scripting - ANS B. Denial of Service A denial of service attack (DoS) consists in compromising the availability of a system or service through a malicious overload of requests, which causes the activation of safety mechanisms that delay or limit the availability of that system or service. Due to this, systems or services are rendered inaccessible to their intended users, Trojans, phishing, and cross-site scripting attacks try to gain access o the system or data, and therefore do not primarily aim at compromising the system's availability. Which devices have the PRIMARY objective of collecting and analyzing security events? ISC2 CYBERSECURITY CERTIFICATION (CC) EXAM 2025 QUESTIONS AND ANSWERS 2 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025 A. Firewalls B. Hubs C. Routers D. SIEM - ANS D. SIEM A security Information and Even Management (SIEM) system is an application that gathers security data from information system components and presents actionable information through a unified interface. Routers and Hubs aim to receive and forward traffic. Firewalls filter incoming traffic. Neither of these last three options aim at collecting and analyzing security events. Which access control model specifies access to an object based on the subject's role in the organization? A. RBAC B. MAC C. ABAC D. DAC - ANS A. RBAC The role-based access control (RBAC) model is well known for governing access to objects based on the roles of individual users within the organization. Mandatory access control is based on security classification. Attribute-access control is based on complex attribute rules. In discretionary access control, subjects can grant privileges to other subjects and change some of the security attributes of the object they have access to, When a company hires an insurance company to mitigate risk, which risk management technique is being applied? A. Risk transfer B. Risk avoidance C. Risk mitigation D. Risk tolerance - ANS A. Risk transfer Risk transfer is a risk management strategy that contractually shifts a pure risk from one party to another (in this case, to an insurance company.) Risk avoidance consists in stopping activities and exposures that can negatively affect an organization and its assets. Risk mitigation consists of mechanism to reduce the risk. Finally, risk tolerance is the degree of risk that an investor is willing to endure. 3 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025 Which type of attack will most effectively provide privileged access (root access in Unix/Linux platforms) to a computer while hiding its presence? A. Rootkits B. Phishing C. Cross-Site Scripting D. Trojans - ANS A. Rootkits A rootkit tries to maintain root-level access while concealing malicious activity. It typically creates a backdoor and attempts to remain undetected by anti-malware software. A rootkit is active while the system is running. Trojans can also create backdoors but are only active while a specific application is running, and thus are not as effective as a rootkit. Phishing is used to initiate attacks by redirecting the user to fake websites. Cross-site scripting is used to attack websites. Which device is used to connect a LAN to the Internet? A. Router B. Firewall C. HIDS D. SIEM - ANS A. Router A router is a device that acts as a gateway between two or more networks by relaying and directing data packets between them. A firewall is a device that filters traffic coming from the Internet but does not seek to distribute traffic. Neither Security Information and Event Management (SIEM) systems nor Host Intrusion Detection Systems (HIDS) are monitoring devices nor applications that aim at inter-network connectivity. How many data labels are considered manageable? A. 1-2 B. 1 C. 2-3 D. >4 - ANS C. 2 - 3 According to data handling and labeling best practices, two or three classifications for data are typically considered manageable for most organizations. In the ISC2 Study Guide, Ch. 5, Module 1, under Data Handling Pract

Meer zien Lees minder
Instelling
ISC2
Vak
ISC2











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
ISC2
Vak
ISC2

Documentinformatie

Geüpload op
5 augustus 2025
Aantal pagina's
79
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

ISC2 CYBERSECURITY
CERTIFICATION (CC) EXAM 2025
QUESTIONS AND ANSWERS


Which access control is more effective at protecting a door against unauthorized access?
A. Fences
B. Turnstiles
C. Barriers

D. Locks - ANS D. Locks
A lock is a device that prevents a physical structure (typically a door) from being opened,
indicating that only the authorized person (i.e. the person with the key) can open it. A fence or
a barrier will prevent ALL access. Turnstiles are physical barrier that can easily overcome (after
all, it is common knowledge that intruders can easily jump over a turnstile when no one is
watching).


Which type of attack PRIMARILY aims to make a resource inaccessible to its intended users?
A. Phishing
B. Denial of Service
C. Trojans

D. Cross-site scripting - ANS B. Denial of Service
A denial of service attack (DoS) consists in compromising the availability of a system or service
through a malicious overload of requests, which causes the activation of safety mechanisms
that delay or limit the availability of that system or service. Due to this, systems or services are
rendered inaccessible to their intended users, Trojans, phishing, and cross-site scripting attacks
try to gain access o the system or data, and therefore do not primarily aim at compromising the
system's availability.


Which devices have the PRIMARY objective of collecting and analyzing security events?
1 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025

,A. Firewalls
B. Hubs
C. Routers

D. SIEM - ANS D. SIEM
A security Information and Even Management (SIEM) system is an application that gathers
security data from information system components and presents actionable information
through a unified interface. Routers and Hubs aim to receive and forward traffic. Firewalls filter
incoming traffic. Neither of these last three options aim at collecting and analyzing security
events.


Which access control model specifies access to an object based on the subject's role in the
organization?
A. RBAC
B. MAC
C. ABAC

D. DAC - ANS A. RBAC
The role-based access control (RBAC) model is well known for governing access to objects based
on the roles of individual users within the organization. Mandatory access control is based on
security classification. Attribute-access control is based on complex attribute rules. In
discretionary access control, subjects can grant privileges to other subjects and change some of
the security attributes of the object they have access to,


When a company hires an insurance company to mitigate risk, which risk management
technique is being applied?
A. Risk transfer
B. Risk avoidance
C. Risk mitigation

D. Risk tolerance - ANS A. Risk transfer
Risk transfer is a risk management strategy that contractually shifts a pure risk from one party
to another (in this case, to an insurance company.) Risk avoidance consists in stopping activities
and exposures that can negatively affect an organization and its assets. Risk mitigation consists
of mechanism to reduce the risk. Finally, risk tolerance is the degree of risk that an investor is
willing to endure.


2 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025

,Which type of attack will most effectively provide privileged access (root access in Unix/Linux
platforms) to a computer while hiding its presence?
A. Rootkits
B. Phishing
C. Cross-Site Scripting

D. Trojans - ANS A. Rootkits
A rootkit tries to maintain root-level access while concealing malicious activity. It typically
creates a backdoor and attempts to remain undetected by anti-malware software. A rootkit is
active while the system is running. Trojans can also create backdoors but are only active while a
specific application is running, and thus are not as effective as a rootkit. Phishing is used to
initiate attacks by redirecting the user to fake websites. Cross-site scripting is used to attack
websites.


Which device is used to connect a LAN to the Internet?
A. Router
B. Firewall
C. HIDS

D. SIEM - ANS A. Router
A router is a device that acts as a gateway between two or more networks by relaying and
directing data packets between them. A firewall is a device that filters traffic coming from the
Internet but does not seek to distribute traffic. Neither Security Information and Event
Management (SIEM) systems nor Host Intrusion Detection Systems (HIDS) are monitoring
devices nor applications that aim at inter-network connectivity.


How many data labels are considered manageable?
A. 1-2
B. 1
C. 2-3

D. >4 - ANS C. 2 - 3
According to data handling and labeling best practices, two or three classifications for data are
typically considered manageable for most organizations. In the ISC2 Study Guide, Ch. 5, Module
1, under Data Handling Practices in Labeling, "two or three classification are manageable, but
3 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025

, more than four tend to be challenging to manage,". These classifications could be labels such as
Public, Confidential, and Restricted, each representing a different level of data sensitivity. The
Labeling system allows the organization to easily identify and manage data based on its
sensitivity level, ensuring that appropriate security measures are in place for each classification.
The principle is that labeling data based on its sensitivity level should be based on a limited,
unambiguous set of labels that correspond to different levels of data sensitivity. The key is to
have a system that differentiates data sensitivity levels without being overly complex to
implement and maintain. (Having more that 4 can make the system overly complex and difficult
to manage, increasing the risk of misclassification and potential data breaches.


In Change Management, which component addresses the procedures needed to undo changes?
A. Request for Approval
B. Rollback
C. Request for Change

D. Disaster and Recover - ANS B. Rollback
In Change Management, the Request for Change (RFC) is the first stage of the request; it
formalizes the change from the stakeholder's point of view. The next phase is the Approval
phase, where each stakeholder reviews the change, identifies and allocates the corresponding
resources, and eventually either approves or rejects the change (appropriately documenting
the approval or rejection). Finally, the Rollback phase addresses the actions to take when the
monitoring change suggests a failure or inadequate performance.


Which of the following is an example of 2FA?
A. One-time passwords (OTA)
B. Keys
C. Badges

D. Passwords - ANS A. One-time passwords (OTA)
One-time passwords are typically generated by a device (i.e. "something you have") and are
required in addition to the actual password (i.e. "something you know"). Badges, keys and
passwords with no overlapping authentication controls are considered single-factor.


Which cloud deployment model is suited to companies with similar needs and concerns?
A. Community cloud
B. Private cloud

4 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Brightstars Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
193
Lid sinds
1 jaar
Aantal volgers
7
Documenten
12191
Laatst verkocht
6 dagen geleden
VERIFIED EXAMS AND STUDY GUIDES.

Here, you will find Study Notes, Exam answer packs 100% Guarenteed success.

3,3

31 beoordelingen

5
10
4
4
3
8
2
3
1
6

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen