ISC2 CC Certified in Cybersecurity Exam Questions 2025

Updated:

Our CC Exam Questions provide real and updated questions for the ISC2 Certified in Cybersecurity certification, all carefully validated by security professionals. Each set includes correct answers with clear explanations and notes on incorrect options to strengthen your understanding of core cybersecurity concepts. With free demo questions and access to our online exam simulator, Cert Empire ensures youโ€™re fully prepared to pass the CC exam with confidence.

Exam Questions

Question 1

Which of the following system hardening techniques involves reducing the attack surface by removing unnecessary software and services?

Options
A:

A. Security configuration management

B:

B. Least privilege principle

C:

C. Patch management

D:

D. Reducing the number of elements of a system

Show Answer
Correct Answer:
D. Reducing the number of elements of a system
Explanation
System hardening aims to secure a system by reducing its vulnerability. A primary method for achieving this is by minimizing the attack surface, which is the sum of all potential entry points for an attacker. The technique of "reducing the number of elements of a system" directly accomplishes this by removing any software, services, user accounts, or open network ports that are not essential for the system's function. Each removed element eliminates a potential vector for attack, thereby simplifying security management and strengthening the system's overall defensive posture. This principle is also known as providing the "least functionality."
Why Incorrect Options are Wrong

A. Security configuration management is the overall process of establishing and maintaining secure settings, which includes reducing elements, but it is not the specific technique itself.

B. The least privilege principle is an access control concept that grants users or processes only the minimum permissions necessary, not about removing system components.

C. Patch management is the process of applying updates to fix vulnerabilities in existing software, rather than removing the software or services.

References

1. National Institute of Standards and Technology (NIST). (2008). Special Publication 800-123: Guide to General Server Security. Section 3.2, "Server Hardening," Paragraph 1. "One of the primary principles of server hardening is to provide only the minimum necessary functionality... This involves removing all unneeded software, services, and utilities from the server."

2. National Institute of Standards and Technology (NIST). (2020). Special Publication 800-53 Revision 5: Security and Privacy Controls for Information Systems and Organizations. Control Family: Configuration Management, Control ID: CM-7, "Least Functionality." The control requires organizations to "[configure] the system to provide only essential capabilities" and "[prohibit] or [restrict] the use of... functions, ports, protocols, and/or services."

3. Saltzer, J. H., & Schroeder, M. D. (1975). The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9), 1278โ€“1308. https://doi.org/10.1109/PROC.1975.9939. This foundational paper discusses the principle of "Economy of mechanism," which supports keeping system design as simple and small as possible, aligning with the concept of reducing elements to improve security.

Question 2

Which of the following principles states that individuals should be held to a standard of doing what a reasonable person would do under similar circumstances?
Options
A: Separation of duties
B: Due diligence
C: Due care
D: Least privilege
Show Answer
Correct Answer:
Due care
Explanation
Due care is the legal and ethical principle that describes the standard of conduct expected of a reasonable person under specific circumstances. In information security, it means taking the necessary, ongoing actions to protect assets and mitigate risks. This standard requires individuals and organizations to act prudently and responsibly to avoid causing harm or loss, which directly aligns with the "reasonable person" test mentioned in the question.
Why Incorrect Options are Wrong

A. Separation of duties is a security control that divides a critical task among multiple individuals to prevent fraud or error, not a standard of conduct.

B. Due diligence refers to the preparatory investigation and research conducted before taking an action to identify potential risks and liabilities.

D. Least privilege is an access control principle that ensures users are only granted the minimum level of access necessary to perform their job functions.

References

1. Cornell Law School, Legal Information Institute (LII). "Due Care." The LII, a reputable academic source, defines due care as: "The degree of care that a reasonable person would exercise under the same or similar circumstances." This provides the foundational legal definition.

Source: https://www.law.cornell.edu/wex/duecare

2. NIST Special Publication 800-161 Revision 1, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations. This official publication distinguishes between the two key concepts.

Section 2.3.2, "Due Diligence and Due Care," states: "Due care is the prudent and responsible execution of the duties and responsibilities associated with a given role or position." This directly supports the concept of ongoing, reasonable action.

3. (ISC)ยฒ. Official (ISC)ยฒ Guide to the CISSP CBK. 6th Edition. CRC Press, 2022. This is an official vendor document for a foundational cybersecurity certification whose concepts are shared with the CC.

Chapter 3, "Security Governance Principles," defines due care as "the standard of care that a reasonable person is expected to exercise in all activities that could potentially harm others." It explicitly contrasts this with due diligence, which is defined as the "process of investigation."

Question 3

What is the primary objective of a Business Continuity Plan (BCP) in the context of incident response, business continuity, and disaster recovery concepts?

Options
A:

A. To ensure the organization can continue to operate during and after a disaster or major incident

B:

B. To focus solely on preventing incidents from occurring

C:

C. To avoid implementing any recovery strategies

D:

D. To disregard the need for a coordinated response to a major incident

Show Answer
Correct Answer:
A. To ensure the organization can continue to operate during and after a disaster or major incident
Explanation
The primary objective of a Business Continuity Plan (BCP) is to ensure that an organization's critical business functions can be maintained or restored in a timely manner during and after a disruptive event. The BCP outlines the procedures and instructions an organization must follow to continue operating. It focuses on the business processes and how to keep them running, distinguishing it from a Disaster Recovery Plan (DRP), which focuses more on restoring IT infrastructure and data after a disaster. The ultimate goal is to minimize operational downtime and the financial impact of the disruption.
Why Incorrect Options are Wrong

B. Focusing solely on prevention is the domain of risk management and security controls, not business continuity, which plans for events that have already occurred.

C. A BCP is fundamentally composed of recovery strategies for critical business processes; avoiding them would defeat its entire purpose.

D. A BCP is a core component of a coordinated response, providing the framework and procedures needed to manage a major incident effectively.

References

1. National Institute of Standards and Technology (NIST). (2010). Special Publication 800-34 Rev. 1, Contingency Planning Guide for Federal Information Systems. Section 2.2, Business Continuity Plan (BCP), Page 7. "The BCP focuses on sustaining an organizationโ€™s mission/business processes during and after a disruption."

2. International Organization for Standardization. (2019). ISO 22301:2019 Security and resilience โ€” Business continuity management systems โ€” Requirements. Section 1, Scope. The standard specifies requirements to "plan, establish, implement, operate, monitor, review, maintain and continually improve a documented management system to protect against, reduce the likelihood of occurrence, prepare for, respond to, and recover from disruptive incidents when they arise."

3. Whitman, M. E., & Mattord, H. J. (2019). Principles of Information Security (6th ed.). Cengage Learning. Chapter 5, "Planning for Contingencies." The text defines business continuity planning as the process that "ensures that critical business functions can continue if a disaster occurs."

Question 4

What type of factor is a callback to a mobile phone?
Options
A: Somewhere you are
B: Something you are
C: Something you have
D: Something you know
Show Answer
Correct Answer:
Something you have
Explanation
Authentication factors are categorized based on how they prove an identity. A callback to a mobile phone is a method that verifies the user is in possession of a specific, pre-registered device. The mobile phone is a physical object that the user possesses. Therefore, this method falls under the "Something you have" category. This is a form of out-of-band authentication where the possession of the communication device (the phone) is the factor being validated.
Why Incorrect Options are Wrong

A. Somewhere you are: This is incorrect because it refers to authentication based on the user's physical location (geolocation), not their possession of an object.

B. Something you are: This is incorrect as it pertains to inherent biological traits (biometrics) like a fingerprint or iris scan, not a physical device.

D. Something you know: This is incorrect because it refers to secret information like a password or PIN, not a tangible item that the user possesses.

---

References

1. National Institute of Standards and Technology (NIST). (June 2017). Special Publication (SP) 800-63B: Digital Identity Guidelines: Authentication and Lifecycle Management.

Section 4.2.3, "Out-of-Band Authenticators," Page 21: This section describes authenticators that use a communication channel separate from the primary one (e.g., a phone call). It explicitly states, "The out-of-band device is a 'something you have' factor." A mobile phone used for a callback is a classic example of such a device.

2. Ometov, A., et al. (2018). "A Survey on Multi-Factor Authentication for the Internet of Things." Sensors, 18(1), 175.

Section 2.1, "Authentication Factors," Paragraph 3: The authors define the possession factor: "The possession factor (something you have) implies that a user has a certain item in his/her possession, e.g., a smart card, a mobile phone, or a physical key." This peer-reviewed article directly classifies a mobile phone as a "something you have" factor.

DOI: https://doi.org/10.3390/s18010175

3. University of California, Berkeley. (Fall 2020). CS 161: Computer Security, Lecture 10: Authentication.

Slide 10, "Factors of Authentication": The course material categorizes authentication factors and provides examples. Under the "Something you have" category, it lists "Physical key," "Smartcard," and "Cell phone (for 2FA)," confirming that a mobile phone used in an authentication process is considered a possession factor.

Question 5

Which of the following documents establishes context and sets out strategic direction and priorities?

Options
A:

A. Regulations

B:

B. Standards

C:

C. Procedures

D:

D. Policies

Show Answer
Correct Answer:
D. Policies
Explanation
Policies are high-level, formal documents that establish management's intent, expectations, and strategic direction for security within an organization. They define the scope of the security program, assign responsibilities, and state the organization's position on specific issues. By setting these overarching goals and principles, policies provide the necessary context and authority for the creation of more detailed standards, procedures, and guidelines. They answer the "what" and "why" of security, thereby setting the strategic priorities for the entire enterprise.
Why Incorrect Options are Wrong

A. Regulations: These are mandatory requirements imposed by external governmental or legal bodies, not an organization's internally-developed strategic direction.

B. Standards: These are mandatory, specific requirements for technology or processes that support policies; they are tactical, not strategic.

C. Procedures: These are detailed, step-by-step instructions for performing a task; they are operational and represent the lowest level of documentation.

References

1. National Institute of Standards and Technology (NIST) Special Publication 800-12 Revision 1, An Introduction to Information Security. Section 4.1, "Policy, Standards, and Practices," states: "Policies are the high-level documents that set the strategic direction, course, and tone for an organizationโ€™s security program." (Page 27, Paragraph 2).

2. National Institute of Standards and Technology (NIST) Special Publication 800-100, Information Security Handbook: A Guide for Managers. Section 2.2, "Security Policy," describes policy as the "foundation of a security program" and notes that it "sets the strategic direction for security." (Page 10, Paragraph 1).

3. University of California, Berkeley, Information Security Office, Policy Program. The documentation on "Policy, Standard, Guideline, and Procedure Definitions" states: "A policy is a statement of intent and is implemented as a procedure or protocol. Policies are the 'what' and the 'why'." This aligns with the strategic, context-setting role of policies.

Question 6

Which of the following security measures is most effective in protecting PII stored on a laptop in case of theft?
Options
A: Regularly updating antivirus software
B: Using strong passwords
C: Enabling a firewall
D: Full-disk encryption
Show Answer
Correct Answer:
Full-disk encryption
Explanation
Full-disk encryption (FDE) is the most effective security measure for protecting Personally Identifiable Information (PII) on a stolen laptop. FDE encrypts the entire contents of the storage drive, rendering the data unreadable to anyone without the correct authentication key (e.g., a password or PIN). In the event of theft, an attacker with physical possession of the laptop cannot bypass the operating system's login screen or remove the hard drive to access the files on another machine. The PII remains confidential and inaccessible because it is cryptographically protected at rest.
Why Incorrect Options are Wrong

A. Regularly updating antivirus software: Antivirus software protects against malware infections while the system is running; it offers no protection against data access if the device is stolen and the drive is accessed directly.

B. Using strong passwords: A strong OS password can be bypassed by an attacker with physical access, for example, by booting from an external drive or by removing the storage drive and mounting it in another computer.

C. Enabling a firewall: A firewall protects a device from unauthorized network traffic. It is irrelevant to protecting data stored locally on a device that has been physically stolen.

References

1. National Institute of Standards and Technology (NIST) Special Publication 800-111, Guide to Storage Encryption Technologies for End User Devices. Section 2.1, "Threats," explicitly lists "Loss or theft of the device" as a primary threat. The document states, "If an unencrypted device is lost or stolen, the data on it is completely accessible to whomever has the device." Section 3.1, "Full Disk Encryption," is presented as the primary solution to this threat.

2. Microsoft Documentation, BitLocker overview. The official documentation for Microsoft's FDE solution states, "BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled." This directly addresses the scenario where the device is no longer in the authorized user's possession, such as in a theft.

3. Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in Computing (5th ed.). This is a standard textbook used in university computer science curricula. Chapter 5.4, "Encryption," discusses its use in protecting stored data: "Encryption is a primary way to protect data in storage... Full disk encryption... means that the entire disk, including all system and user files, is encrypted. A user must enter a password to boot the computer, and that password decrypts the disk." This highlights its effectiveness against physical access threats.

Question 7

What is the cloud computing model where customers share computing infrastructure without knowing each other's identity?

Options
A:

A. Community cloud

B:

B. Private cloud

C:

C. Shared cloud

D:

D. Public cloud

Show Answer
Correct Answer:
D. Public cloud
Explanation
The public cloud model is defined by its multi-tenant architecture, where a cloud service provider makes computing resources available to the general public over the internet. The underlying physical infrastructure is owned and operated by the provider and is shared among numerous customers, known as tenants. These tenants are logically isolated from one another, operate independently, and are unaware of the other organizations or individuals sharing the same hardware. This model leverages economies of scale to offer services on a pay-as-you-go basis.
Why Incorrect Options are Wrong

A. Community cloud: This model is shared by a specific group of organizations with common goals, so tenants are known within the community.

B. Private cloud: This infrastructure is dedicated to a single organization, so there is no sharing with external, unknown customers.

C. Shared cloud: This is a general descriptive term, not one of the four standard deployment models (Public, Private, Community, Hybrid) defined by NIST.

References

1. Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing (Special Publication 800-145). National Institute of Standards and Technology. Retrieved from https://doi.org/10.6028/NIST.SP.800-145.

Page 3, Section 2, "Deployment Models": "Public cloud: The cloud infrastructure is provisioned for open use by the general public... It exists on the premises of the cloud provider." This definition underpins the concept of shared infrastructure among unknown parties.

2. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M. (2009). A View of Cloud Computing (Technical Report No. UCB/EECS-2009-28). EECS Department, University of California, Berkeley.

Page 2, Section 2, "Defining Cloud Computing": Describes a Public Cloud as a resource available to the general public on a pay-as-you-go basis, contrasting it with a Private Cloud which is internal to an organization. This highlights the "general public" aspect where tenants are not pre-associated.

3. Carnegie Mellon University, School of Computer Science. (n.d.). 15-319/15-619 Cloud Computing, Lecture 2: Cloud Models and Architectures.

In course materials covering cloud deployment models, the Public Cloud is consistently defined as a multi-tenant environment where resources are shared by a diverse and anonymous customer base, managed by a third-party provider.

Question 8

Which type of network attack involves an attacker sending specially crafted malicious data to an application or system, causing it to crash or become unresponsive?
Options
A: SQL Injection Attack
B: On Path Attack
C: Distributed Denial-of-Service Attack
D: Buffer Overflow Attack
Show Answer
Correct Answer:
Buffer Overflow Attack
Explanation
A buffer overflow attack is a specific type of software vulnerability exploitation where an attacker sends more data to a memory buffer than it is designed to handle. This excess data overwrites adjacent memory regions, which can corrupt data, crash the program, or create an opening for executing malicious code. The attack relies on sending "specially crafted malicious data"โ€”input that is intentionally too largeโ€”to cause the target application to become unstable or unresponsive, which directly aligns with the question's description.
Why Incorrect Options are Wrong

A. SQL Injection Attack: This attack targets the back-end database by inserting malicious SQL statements into an entry field, aiming for data theft or manipulation, not crashing the application with malformed data.

B. On Path Attack: This involves intercepting and potentially altering communications between two parties to eavesdrop or impersonate, not directly attacking an application to make it crash.

C. Distributed Denial-of-Service Attack: This attack uses a high volume of traffic from multiple sources to overwhelm a system's resources (like bandwidth or CPU), not a single piece of crafted data to exploit a software flaw.

References

1. Kuperman, B. A., et al. (2005). A Taxonomy of Buffer Overflows. University of Virginia, Department of Computer Science. Technical Report CS-2005-14. In Section 2, "Background," the report states, "When the buffer is overfilled, the excess data 'spills over' into adjacent memory, overwriting whatever data had been there... At a minimum, this memory corruption can cause the program to crash."

2. MITRE. (2023). CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'). Common Weakness Enumeration. The "Consequences" section notes that a primary technical impact is "Availability: The application may crash or be in a state where it is not usable."

3. Erickson, J. (2008). Hacking: The Art of Exploitation, 2nd Edition. No Starch Press. Chapter 3, "Exploitation," Section "Stack-Based Buffer Overflows," pp. 86-87, describes how writing past a buffer's boundaries can overwrite critical program data on the stack, leading to a segmentation fault and causing the program to crash. (Note: While a commercial book, its author is a recognized academic and it is used as courseware in many universities).

4. Aleph One. (1996). Smashing The Stack For Fun And Profit. Phrack Magazine, Volume 7, Issue 49. This foundational paper on the topic explains in Section 4, "Stack-based buffer overruns," how overflowing a buffer corrupts the stack, which typically results in a "Segmentation violation" error, terminating the program. This is a seminal, peer-reviewed publication in the security community.

Question 9

What is the term for the random value added to a password to prevent rainbow table attacks?

Options
A:

A. Salt

B:

B. Extender

C:

C. MD5

D:

D. Hash

Show Answer
Correct Answer:
A. Salt
Explanation
A salt is a cryptographically random value concatenated with a password before hashing. Because each passwordโ€™s salt is unique and stored with the hash, pre-computed lookup tables (rainbow tables) cannot be reused: an attacker would have to build a new table for every possible salt, rendering the attack impractical.
Why Incorrect Options are Wrong

B. Extender โ€“ Not a security term in password hashing; no role against rainbow tables.

C. MD5 โ€“ A hash algorithm, not the random value added; MD5 itself can be used with or without salting.

D. Hash โ€“ The fixed-length output produced after hashing; it is the result, not the random value added.

References

1. NIST Special Publication 800-63B, โ€œDigital Identity Guidelines: Authentication and Lifecycle Management,โ€ ยง5.1.1.2, p. 18 (June 2017).

2. Philip Oechslin, โ€œMaking a Faster Cryptanalytic Time-Memory Trade-Off,โ€ Advances in Cryptology โ€“ CRYPTO 2003, LNCS 2775, pp. 617-630 (2003). DOI:10.1007/978-3-540-45146-436

3. MIT OpenCourseWare, 6.857 โ€œNetwork and Computer Security,โ€ Lecture 5 slides, โ€œPassword Hashing and Salting,โ€ slides 7-9 (Spring 2014).

4. National Research Council, โ€œCryptographyโ€™s Role in Securing the Information Society,โ€ Chapter 5, ยงโ€œPassword File Protection,โ€ p. 110 (1996).

Question 10

A security analyst discovers a vulnerability in a client's system but decides to withhold the information, fearing negative publicity for the client. Which ISC2 Code of Ethics Canon has the analyst potentially violated?
Options
A: Advance and protect the profession
B: Act honorably, honestly, justly, responsibly, and legally
C: Protect society, the common good, necessary public trust and confidence, and the infrastructure
D: Provide diligent and competent service to principals
Show Answer
Correct Answer:
Provide diligent and competent service to principals
Explanation
The analyst has a direct professional obligation to their client, who is the "principal" in this context. The primary role of a security analyst is to identify and report security weaknesses to enable remediation. By intentionally withholding information about a discovered vulnerability, the analyst is failing to provide the diligent and competent service for which they were engaged. This action directly undermines the client's security and represents a fundamental breach of the analyst's professional duty to their principal.
Why Incorrect Options are Wrong

A. The primary harm is to the client's security, not a direct action against the reputation of the security profession itself.

B. While the action is dishonest, Canon III is more specific as it directly addresses the failure in professional service owed to a client.

C. The immediate duty violated is to the client (principal), not directly to society, although an exploited vulnerability could eventually harm the public.

References

1. (ISC)ยฒ. (2023). ISC2 Code of Ethics. Retrieved from https://www.isc2.org/Ethics. The canon states, "Provide diligent and competent service to principals." Withholding critical security information is a direct failure to meet this standard.

2. Chapple, M., Seidl, D., & St. Germain, J. (2023). Official (ISC)ยฒ Certified in Cybersecurity (CC) Study Guide. Wiley. In Chapter 1, "Security Principles," the explanation for Canon III emphasizes providing high-quality work for employers and clients (principals). The text states, "This means you should always strive to provide high-quality work for your employers and clients" (p. 13). Concealing a vulnerability is the antithesis of providing high-quality, diligent service.

Sale!
Total Questions600
Last Update Check October 15, 2025
Online Simulator PDF Downloads
50,000+ Students Helped So Far
$30.00 $50.00 40% off
Rated 5 out of 5
5.0 (25 reviews)

Instant Download & Simulator Access

Secure SSL Encrypted Checkout

100% Money Back Guarantee

What Users Are Saying:

Rated 5 out of 5

โ€œThe practice questions were spot on. Felt like I had already seen half the exam. Passed on my first try!โ€

Sarah J. (Verified Buyer)

Download Free Demo PDF Free CC Practice Test
Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE