Free Practice Test

Free CC Exam Questions

ISC2 CC Free Exam Questions

Disclaimer

Please keep a note that the demo questions are not frequently updated. You may as well find them in open communities around the web. However, this demo is only to depict what sort of questions you may find in our original files.

Nonetheless, the premium exam dumps files are frequently updated and are based on the latest exam syllabus and real exam questions.

1 / 60

Which of the following is very likely to be used in a disaster recovery effort?

2 / 60

Which of these components is very likely to be instrumental to any disaster recovery (DR) effort?

3 / 60

A set of security controls or system settings used to ensure uniformity of configuration through the IT environment.

4 / 60

You are working in your organization's security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user's account has been compromised. This is an example of a.....

5 / 60

An external entity has tried to gain access to your organization's IT environment without proper authorization. This Will be called ________

6 / 60

True or False? The IT department is responsible for creating the organization's business continuity plan.

7 / 60

Which of these activities is often associated with DR efforts?

8 / 60

Which of the following statements best describes the purpose of deception technology in cybersecurity?

9 / 60

A company wants to ensure that only employees with specific roles can access certain data. Which access control model should they implement?

10 / 60

A company is concerned about data loss during a disaster. What type of backup strategy should they implement to minimize data loss?

11 / 60

An organization is implementing a zero-trust security model. Which of the following statements accurately reflects a key principle of zero-trust architecture?

12 / 60

Which principle addresses the information security strategy by integrating people, technology, and operations to establish variable barriers across multiple layers and missions of the organization?

13 / 60

A common network device used to filter traffic?

14 / 60

What are the primary approaches ids take to analyse events to detect attacks?

15 / 60

Which of the following is the least secure communications protocol?

16 / 60

David is worried about distributed denial of service attacks against his company’s primary web application. which of the following options will provide the MOST resilience against large-scale DDoS attacks?

17 / 60

Which type of network is set up similar to the internet but is private to an organization? Select the MOST appropriate.

18 / 60

Julia is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

19 / 60

What is the purpose of non-repudiation in information security?

20 / 60

Which one of the following cryptographic algorithms does not depend upon the prime factorization problem?

21 / 60

Some Employees of his organization launched a privilege escalation attack to gain root access to one of the organization’s database servers. The employee does have an authorized user account on the server. What log file would be MOST likely to contain relevant information??

22 / 60

Which of the following best describes a zero-day vulnerability?

23 / 60

What is the primary goal of a risk management process in cybersecurity?A) B) C) D) 

24 / 60

What is the primary goal of implementing input validation in application security?

25 / 60

Which of the following is a common security measure to prevent Cross- Site Scripting (XSS) attacks in web applications?A) B) C) D) 

26 / 60

Which of the following best describes the principle of least privilege?

27 / 60

What is the primary goal of implementing security policies in an organization?

28 / 60

Which security principle focuses on ensuring that data cannot be altered without authorization?

29 / 60

Which of the following is an example of a physical security control?

30 / 60

Which of the following best describes the concept of defense in depth?

31 / 60

What is the main goal of business continuity planning?

32 / 60

Which phase of the disaster recovery plan involves the restoration of normal operations?

33 / 60

What is the purpose of conducting a Business Impact Analysis (BIA)?

34 / 60

Which of the following is a primary component of an incident response plan?

35 / 60

What is the main purpose of disaster recovery testing?

36 / 60

Which access control model is based on the classification of information and clearance levels of users?

37 / 60

What is the primary purpose of the principle of separation of duties?

38 / 60

Which access control model permits data owners to decide who can access their resources?

39 / 60

What is an example of  preventive access control?

40 / 60

Which of the following best describes the concept of least privilege?

41 / 60

What is the main advantage of using Single Sign-On (SSO)?

42 / 60

Which device is primarily used to filter and monitor network traffic, both incoming and outgoing, according to predefined security rules?

43 / 60

What is the primary function of a Virtual Private Network (VPN)?

44 / 60

Which of the following is a common method for preventing DDoS attacks?

45 / 60

What type of attack involves intercepting and possibly modifying communication between two parties without their awareness?

46 / 60

What security measure is used to detect and prevent unauthorized access to a private network?

47 / 60

What is the primary goal of security operations within an organization?

48 / 60

Which of the following is a key activity in security operations to maintain the integrity of systems?

49 / 60

What type of system is designed to automatically detect and respond to potential security threats?

50 / 60

Which of the following best describes a security incident?

51 / 60

What is the purpose of a Security Operations Center (SOC)?

52 / 60

Which process involves identifying, assessing, and mitigating risks to an organization’s information systems?

53 / 60

You are assisting your organization in implementing new firewall rules. What type of control are you implementing?

54 / 60

You become aware that one of your colleagues provided a CC candidate with the text of several questions that appeared on their certification exam. What canon of the ISC2 code of ethics was most directly violated?

55 / 60

Your organization recently experienced a disaster that activated their disaster recovery program. At what point is the effort considered concluded?

56 / 60

Your organization recently experienced a security incident where the attacker was able to take down your primary website. What cybersecurity principle does this attack most directly violate?

57 / 60

You are building a new file system where each department’s managers can control access to files stored on their portion of the server, granting it to anyone they choose. What access control model best describes this approach?

58 / 60

Which one of the following is NOT a standard part of the crime prevention through environmental design (CP TED) philosophy?

59 / 60

You are setting up a new wireless network and would like to configure it to require that people accept terms and conditions before using the network. The network will be used by many thousands of guests each day. What access control mechanism would be most efficient?

60 / 60

You are installing a public-facing web server for your organization. What network zone would be the most appropriate for this device?

Your score is

The average score is 68%

Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE