Spring Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

CC CC - Certified in Cybersecurity Questions and Answers

Questions 4

Which OSI layer associates MAC addresses with network devices?

Options:

A.

Physical layer

B.

Network layer

C.

Data Link layer

D.

Transport layer

Buy Now
Questions 5

Which access control model can grant access to a given object based on complex rules?

Options:

A.

ABAC

B.

DAC

C.

MAC

D.

RBAC

Buy Now
Questions 6

Load balancing primarily safeguards which CIA triad element?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

All

Buy Now
Questions 7

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which control would BEST achieve his objective?

Options:

A.

URL Filter

B.

IP Address Block

C.

DLP Solution

D.

IPS Solution

Buy Now
Questions 8

The primary functionality of Privileged Access Management (PAM) is:

Options:

A.

Validate access to a file

B.

Prevent unauthorized access to assets

C.

Provide just-in-time access to critical resources

D.

Manage centralized access control

Buy Now
Questions 9

What type of attack does the attacker store and reuse login information? Select the BEST answer.

Options:

A.

Man-in-the-middle attack

B.

Smurf attack

C.

DDoS attack

D.

Replay attack

Buy Now
Questions 10

An integrated platform and graphical tool for security testing of web applications is:

Options:

A.

Burp Suite

B.

Wireshark

C.

Fiddler

D.

Zenmap

Buy Now
Questions 11

A method for risk analysis that is based on the assignment of a descriptor such as low, medium, or high.

Options:

A.

Quantitative Risk Analysis

B.

Risk Assessment

C.

Risk Mitigation

D.

Qualitative Risk Analysis

Buy Now
Questions 12

Embedded systems and network-enabled devices that communicate with the Internet are:

Options:

A.

Endpoints

B.

Nodes

C.

IoT

D.

Routers

Buy Now
Questions 13

The magnitude of harm expected from unauthorized disclosure, modification, destruction, or loss of information is known as:

Options:

A.

Threat

B.

Vulnerability

C.

Impact

D.

Likelihood

Buy Now
Questions 14

David is worried about distributed denial-of-service (DDoS) attacks against his company’s primary web application. Which option will provide the MOST resilience against large-scale DDoS attacks?

Options:

A.

Implement a CDN

B.

Increase the number of servers in the web application cluster

C.

Contract for DDoS mitigation services via the company’s IPS

D.

Increase bandwidth from one or more ISPs

Buy Now
Questions 15

Ping flood attacks target which OSI layer?

Options:

A.

Layer 4

B.

Layer 3

C.

Layer 5

D.

Layer 6

Buy Now
Questions 16

A company network experiences a sudden flood of network packets that causes major slowdown in Internet traffic. What type of event is this?

Options:

A.

Security incident

B.

Natural disaster

C.

Exploit

D.

Adverse event

Buy Now
Questions 17

An authorized simulated attack to evaluate security is called:

Options:

A.

Penetration test

B.

Security testing

C.

Automated testing

D.

Regression testing

Buy Now
Questions 18

Critical business functions are disrupted due to a system outage. Which plan sustains operations?

Options:

A.

DRP

B.

BCP

C.

IRP

D.

All

Buy Now
Questions 19

Which one of the following groups is NOT normally part of an organization's cybersecurity incident response team?

Options:

A.

Technical subject matter experts

B.

Cybersecurity experts

C.

Management

D.

Law enforcement

Buy Now
Questions 20

Why is security training important?

Options:

A.

Because it fulfills regulatory requirements

B.

Because it helps people perform job duties more efficiently

C.

Because it reduces the risk of attacks such as social engineering

D.

All

Buy Now
Questions 21

Exhibit.

CC Question 21

What is the PRIMARY purpose of a web application firewall (WAF)?

Options:

A.

To protect the web server from DDoS attacks

B.

To monitor network traffic for intrusions

C.

To filter and block malicious web traffic and requests

D.

To manage SSL certificates

Buy Now
Questions 22

What does the termbusinessin business continuity planning refer to?

Options:

A.

The financial performance of the organization

B.

The technical systems of the organization

C.

The operational aspects of the organization

D.

The physical infrastructure of the organization

Buy Now
Questions 23

Which is NOT a function of an Intrusion Prevention System (IPS)?

Options:

A.

Encrypt network traffic

B.

Monitor network traffic

C.

Filter network traffic

D.

Detect and prevent attacks

Buy Now
Questions 24

Which OSI layer does a VPN primarily operate at?

Options:

A.

Layer 5

B.

Layer 6

C.

Layer 1

D.

Layer 3

Buy Now
Questions 25

COVID-19 is an example where which plan sustains business?

Options:

A.

IRP

B.

DRP

C.

BCP

D.

All

Buy Now
Questions 26

Who should participate in creating a Business Continuity Plan?

Options:

A.

Management only

B.

IT only

C.

Finance only

D.

Members across the organization

Buy Now
Questions 27

Which attack most effectively maintains remote access and control over a victim’s computer?

Options:

A.

Phishing

B.

Trojans

C.

XSS

D.

Rootkits

Buy Now
Questions 28

An event that jeopardizes confidentiality, integrity, or availability is called:

Options:

A.

Breach

B.

Event

C.

Incident

D.

Exploit

Buy Now
Questions 29

What is the recommended temperature range for optimal data center uptime?

Options:

A.

62°F–69°F

B.

64°F–81°F

C.

82°F–90°F

D.

91°F–100°F

Buy Now
Questions 30

Which is NOT a possible model for an Incident Response Team (IRT)?

Options:

A.

Leveraged

B.

Dedicated

C.

Hybrid

D.

Outsourced

Buy Now
Questions 31

Who must follow HIPAA compliance?

Options:

A.

Energy sector

B.

Health care

C.

Finance sector

D.

All

Buy Now
Questions 32

Which threat is directly associated with malware?

Options:

A.

APT

B.

Ransomware

C.

Trojan

D.

DDoS

Buy Now
Questions 33

Which of these components is very likely to be instrumental to any disaster recovery (DR) effort?

Options:

A.

Routers

B.

Laptops

C.

Firewalls

D.

Backups

Buy Now
Questions 34

In what way do a victim’s files get affected by ransomware?

Options:

A.

By destroying them

B.

By encrypting them

C.

By stealing them

D.

By selling them

Buy Now
Questions 35

Activities necessary to restore IT and communications services are known as:

Options:

A.

Incident response

B.

Business continuity

C.

Risk management

D.

Disaster recovery

Buy Now
Questions 36

Which type of control is used to restore systems or processes to their normal state after an attack?

Options:

A.

Compensatory control

B.

Recovery control

C.

Detective control

D.

Corrective control

Buy Now
Questions 37

The first phase of the System Development Life Cycle (SDLC) is:

Options:

A.

Requirements analysis

B.

Feasibility study

C.

Design

D.

Development

Buy Now
Questions 38

Which access control model is best suited for a large organization with many departments and varied access needs?

Options:

A.

DAC

B.

RBAC

C.

MAC

D.

RuBAC

Buy Now
Questions 39

Which type of database combines related records and fields into a logical tree structure?

Options:

A.

Relational

B.

Hierarchical

C.

Object-oriented

D.

Network

Buy Now
Questions 40

True or False: The IT department is responsible for creating the organization’s Business Continuity Plan.

Options:

A.

True

B.

False

Buy Now
Questions 41

Modern solutions that detect rootkits, ransomware, and spyware are:

Options:

A.

Antivirus

B.

IDS

C.

IPS

D.

Anti-malware

Buy Now
Questions 42

Often offered by third-party organizations and covering advisory or compliance objectives:

Options:

A.

Standard

B.

Policy

C.

Procedure

D.

Laws or Regulations

Buy Now
Questions 43

An organization’s security system that prevents, detects, analyzes, and responds to cybersecurity incidents is called:

Options:

A.

Business continuity team

B.

Disaster recovery team

C.

Incident response team

D.

Security Operations Center

Buy Now
Questions 44

Which type of application can intercept sensitive information such as passwords on a network segment?

Options:

A.

Log server

B.

Network scanner

C.

Firewall

D.

Protocol analyzer

Buy Now
Questions 45

What cybersecurity principle focuses on granting users only the privileges necessary to perform their job functions?

Options:

A.

Least privilege

B.

Defense in depth

C.

Separation of duties

D.

Need-to-know basis

Buy Now
Questions 46

Which type of control minimizes the impact of an attack and restores normal operations as quickly as possible?

Options:

A.

Compensatory control

B.

Corrective control

C.

Recovery control

D.

Detective control

Buy Now
Questions 47

Which technology should be implemented to increase the work effort required for buffer overflow attacks?

Options:

A.

Address Space Layout Randomization

B.

Memory induction application

C.

Input memory isolation

D.

Read-only memory integrity checks

Buy Now
Questions 48

Hashing safeguards which CIA triad principle?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

All

Buy Now
Questions 49

XenServer, LVM, Hyper-V, and ESXi are:

Options:

A.

Type 2 hypervisors

B.

Type 1 hypervisors

C.

Both

D.

None

Buy Now
Questions 50

Malware that disguises itself as legitimate software is called:

Options:

A.

Worm

B.

Trojan

C.

Virus

D.

Ransomware

Buy Now
Questions 51

What is the term used to denote the inherent set of privileges assigned to a user upon the creation of a new account?

Options:

A.

Aggregation

B.

Transitivity

C.

Baseline

D.

Entitlement

Buy Now
Questions 52

What is multi-factor authentication (MFA)?

Options:

A.

A type of authentication that uses only one method

B.

A type of authentication that uses only two methods

C.

A type of authentication that uses more than two methods

D.

A type of authentication that uses only one factor

Buy Now
Questions 53

Representation of data at OSI Layer 3 is called a:

Options:

A.

Segment

B.

Packet

C.

Frame

D.

None of the above

Buy Now
Questions 54

Which concept prevents crime by designing a physical environment that positively influences human behavior?

Options:

A.

DMZ

B.

Security alarm

C.

CPTED

D.

CCTV

Buy Now
Questions 55

Created by switches to logically segment a network without changing physical topology:

Options:

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Buy Now
Questions 56

Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which control would BEST achieve this objective?

Options:

A.

URL filter

B.

IP address block

C.

DLP solution

D.

IPS solution

Buy Now
Questions 57

A structured approach used to oversee and manage risk for an enterprise is called:

Options:

A.

Risk assessment

B.

Risk threshold

C.

Risk Management Framework

D.

Risk appetite

Buy Now
Questions 58

What is the process of verifying a user’s identity called?

Options:

A.

Confidentiality

B.

Authentication

C.

Authorization

D.

Identification

Buy Now
Questions 59

A DDoS attack affects which OSI layers?

Options:

A.

Network layer

B.

Transport layer

C.

Physical layer

D.

Both A and B

Buy Now
Questions 60

Which term describes a communication tunnel that provides point-to-point transmission of authentication and data traffic over an untrusted network?

Options:

A.

Zero Trust

B.

DMZ

C.

VPN

D.

None of the above

Buy Now
Questions 61

If a device is found to be non-compliant with the security baseline, what action should the security team take?

Options:

A.

Report

B.

Evaluate

C.

Ignore

D.

Disable or isolate it into a quarantine area until it can be checked and updated

Buy Now
Questions 62

A curated knowledge base modeling adversary behavior across attack phases is:

Options:

A.

MITRE ATTandCK

B.

CVE

C.

RMF

D.

Security Management

Buy Now
Questions 63

Which of these is the WEAKEST form of authentication we can implement?

Options:

A.

Something you know

B.

Something you are

C.

Something you have

D.

Biometric authentication

Buy Now
Questions 64

What is the first component the new security engineer should learn about in the incident response plan?

Options:

A.

Detection and analysis

B.

Preparation

C.

Containment

D.

Eradication

Buy Now
Questions 65

Ignoring a risk and continuing business operations is known as:

Options:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk avoidance

D.

Risk transfer

Buy Now
Questions 66

Which works by encapsulating one packet inside another?

Options:

A.

Network segmentation

B.

Load balancing

C.

Tunneling

D.

Data encryption

Buy Now
Questions 67

Which can be considered a fingerprint of a file or message?

Options:

A.

Hashing

B.

Encryption

C.

Decryption

D.

Encoding

Buy Now
Questions 68

John joined the ISC2 organization. His manager asked him to check the authentication controls in a security module. What would John use to ensure a certain control is working as he expects it to?

Options:

A.

Security testing

B.

Security assessment

C.

Security audit

D.

Security walkthrough

Buy Now
Questions 69

What is an incident in cybersecurity?

Options:

A.

Any event

B.

Unauthorized access

C.

An exploit

D.

An event that jeopardizes CIA

Buy Now
Questions 70

A transaction over $50,000 requires approval from both a manager and an accountant. Which concept applies?

Options:

A.

MAC

B.

Defense in Depth

C.

Two-Person Integrity

D.

Principle of Least Privilege

Buy Now
Questions 71

Who is responsible for publishing and signing the organization’s policies?

Options:

A.

The security office

B.

Human resources

C.

Senior management

D.

The legal department

Buy Now
Questions 72

A prolonged, targeted cyberattack where an intruder remains undetected for an extended period is called:

Options:

A.

Spoofing

B.

Phishing

C.

DoS

D.

Advanced Persistent Threat

Buy Now
Questions 73

The DevOps team has updated the application source code. Tom discovered that many unauthorized changes have been made. What is the BEST control Tom can implement to prevent a recurrence of this problem?

Options:

A.

Backup

B.

File labels

C.

Security audit

D.

Hashing

Buy Now
Questions 74

Dylan is creating a cloud architecture that requires connections between systems in two different private VPCs. What is the BEST way to enable this access?

Options:

A.

VPN connection

B.

Internet gateway

C.

Public IP address

D.

VPC endpoint

Buy Now
Questions 75

Access control used in high-security military and government environments:

Options:

A.

DAC

B.

MAC

C.

RBAC

D.

ABAC

Buy Now
Questions 76

Which protocol would be most suitable to fulfill the secure communication requirements between clients and the server for a company deploying a new application?

Options:

A.

FTP

B.

HTTP

C.

HTTPS

D.

SMTP

Buy Now
Questions 77

The common term for systems that control temperature and humidity in a data center is:

Options:

A.

VLAN

B.

STAT

C.

TAWC

D.

HVAC

Buy Now
Questions 78

Which is related to privacy?

Options:

A.

GDPR

B.

FIPS

C.

MOU

D.

All

Buy Now
Questions 79

Which is very likely to be used in a Disaster Recovery effort?

Options:

A.

Guard dogs

B.

Contract personnel

C.

Data backups

D.

Anti-malware solutions

Buy Now
Questions 80

A DLP solution should be deployed so it can inspect all forms of data leaving the organization, including:

Options:

A.

Posting to websites

B.

Applications and APIs

C.

Copying to portable media

D.

All

Buy Now
Questions 81

What is the best practice to clear SSD storage after use?

Options:

A.

Zero fill

B.

Degaussing

C.

Clearing

D.

Disintegration

Buy Now
Questions 82

Scans networks to determine connected devices and services:

Options:

A.

Burp Suite

B.

Wireshark

C.

Fiddler

D.

Zenmap

Buy Now
Questions 83

Walmart has a large e-commerce presence worldwide. Which solution would ensure the LOWEST possible latency for customers using their services?

Options:

A.

CDN

B.

SaaS

C.

Load balancing

D.

Decentralized data centers

Buy Now
Questions 84

What is the benefit of subnetting?

Options:

A.

By increasing network bandwidth

B.

By improving network security

C.

By reducing network congestion

D.

By simplifying network management

Buy Now
Questions 85

A set of instructions to detect, respond to, and recover from security incidents is a:

Options:

A.

BCP

B.

IRP

C.

DRP

D.

None

Buy Now
Questions 86

A hacker launches a specific attack to exploit a known vulnerability. This is called:

Options:

A.

Breach

B.

Event

C.

Exploit

D.

Intrusion

Buy Now
Questions 87

What is sensitivity in the context of confidentiality?

Options:

A.

Harm caused to external stakeholders

B.

Ability of information to be accessed only by authorized users

C.

Need for protection assigned to information by its owner

D.

Health status of individuals

Buy Now
Questions 88

What is the primary goal of input validation?

Options:

A.

Secure storage

B.

Prevent unauthorized access

C.

Prevent code injection attacks

D.

Encrypt data

Buy Now
Questions 89

Which element of the security policy framework includes recommendations that are NOT binding?

Options:

A.

Procedures

B.

Guidelines

C.

Standards

D.

Policies

Buy Now
Questions 90

Limiting access based on data sensitivity and user authorization is known as:

Options:

A.

DAC

B.

MAC

C.

RuBAC

D.

RBAC

Buy Now
Questions 91

What is the purpose of the CIA triad?

Options:

A.

Make security understandable

B.

Describe security concepts

C.

Define the purpose of security

D.

All

Buy Now
Questions 92

Configuration settings or parameters stored as data and managed through a software graphical user interface (GUI) are examples of:

Options:

A.

Logical access control

B.

Physical access control

C.

Administrative access control

Buy Now
Questions 93

The evaluation of security controls to determine whether they are implemented correctly and operating as intended is known as:

Options:

A.

Security assessment

B.

Risk assessment

C.

DRP

D.

IRP

Buy Now
Questions 94

Embedded systems and network-enabled devices that communicate with the Internet are considered:

Options:

A.

Endpoint

B.

Node

C.

IoT

D.

Router

Buy Now
Questions 95

David's team recently implemented a new system that gathers information from a variety of different log sources, analyzes that information, and then triggers automated playbooks in response to security events. What term BEST describes this technology?

Options:

A.

SIEM

B.

Log Repository

C.

IPS

D.

SOAR

Buy Now
Questions 96

Why is a “Red Book” important in Business Continuity Planning?

Options:

A.

To have a hard copy for easy access

B.

Easy to carry and transfer

C.

When disasters disable power and electronic access

D.

All

Buy Now
Questions 97

What is the purpose of non-repudiation in information security?

Options:

A.

To ensure data is always accessible when needed

B.

To protect data from unauthorized access

C.

To prevent the sender or recipient of a message from denying having sent or received the message

D.

To ensure data is accurate and unchanged

Buy Now
Questions 98

Which attack attempts to gain information by observing a device’s power consumption?

Options:

A.

DoS

B.

Side-channel attack

C.

XSS

D.

CSRF

Buy Now
Questions 99

What is the purpose of multi-factor authentication (MFA) in IAM?

Options:

A.

To simplify user access

B.

To eliminate the need for authentication

C.

To add an additional layer of security by requiring multiple forms of verification

D.

To grant unrestricted access to all users

Buy Now
Questions 100

What is the focus of disaster recovery planning after a data center failure?

Options:

A.

Maintain business functions

B.

Fix hardware

C.

Restore IT and communications

D.

Guide emergency responders

Buy Now
Questions 101

Which fire suppression system is more friendly to electronics?

Options:

A.

Carbon dioxide–based

B.

Chemical-based

C.

Water-based

D.

Foam-based

Buy Now
Questions 102

A company wants employees to access resources from anywhere in the world. Which access control model is best?

Options:

A.

DAC

B.

RBAC

C.

MAC

D.

ABAC

Buy Now
Questions 103

Actions, processes, and tools ensuring continuity of critical operations:

Options:

A.

BC

B.

DR

C.

IR

D.

All

Buy Now
Questions 104

A security event does not affect confidentiality, integrity, or availability. What is it?

Options:

A.

Exploit

B.

Breach

C.

Incident

D.

Event

Buy Now
Questions 105

Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?

Options:

A.

Brute-force attack

B.

Dictionary attack

C.

Social engineering attack

D.

Replay attack

Buy Now
Questions 106

A hacker intercepts network traffic to steal login credentials. Which OSI layer is being attacked?

Options:

A.

Data Link layer

B.

Physical layer

C.

Network layer

D.

Application layer

Buy Now
Questions 107

What is the primary purpose of a honeytoken in cybersecurity?

Options:

A.

To lure and detect attackers

B.

To encrypt sensitive data

C.

To enhance network performance

D.

To manage user access

Buy Now
Questions 108

Which document identifies the principles and rules governing an organization’s protection of information systems and data?

Options:

A.

Procedure

B.

Guideline

C.

Policy

D.

Standard

Buy Now
Questions 109

Mark’s proposed configuration change must be approved and tested by a Change Control Board. This is an example of:

Options:

A.

Holistic security

B.

Defense in depth

C.

Threat intelligence

D.

Segregation of duties

Buy Now
Questions 110

Communication between end systems is encrypted using a key, often known as ________?

Options:

A.

Temporary key

B.

Section key

C.

Public key

D.

Session key

Buy Now
Questions 111

Information should be consistently and readily accessible for authorized parties.

Options:

A.

Confidentiality

B.

Authentication

C.

Availability

D.

Non-repudiation

Buy Now
Questions 112

What drove the introduction of IPv6?

Options:

A.

IPv4 was insecure

B.

IPv4 was incompatible

C.

IPv4 address exhaustion

D.

IPv6 supports Wi-Fi

Buy Now
Questions 113

In which access control model can the creator of an object delegate permissions?

Options:

A.

MAC

B.

RBAC

C.

ABAC

D.

DAC

Buy Now
Questions 114

A structured way to align IT with business goals while managing risk and regulations:

Options:

A.

GRC

B.

Policies

C.

Law

D.

Standard

Buy Now
Questions 115

Which cloud service model provides the most suitable environment for customers to build and operate their own software?

Options:

A.

SaaS

B.

IaaS

C.

PaaS

Buy Now
Questions 116

Protection against an individual falsely denying having performed a particular action.

Options:

A.

Authentication

B.

Identification

C.

Verification

D.

Non-repudiation

Buy Now
Questions 117

Which of the following is unlikely to be a member of the disaster recovery team?

Options:

A.

Executive management

B.

Public relations

C.

Billing clerk

D.

IT personnel

Buy Now
Questions 118

The process of how an organization is managed and how decisions are made is called:

Options:

A.

Standard

B.

Policy

C.

Procedure

D.

Governance

Buy Now
Questions 119

Which of the following properties is NOT guaranteed by digital signatures?

Options:

A.

Authentication

B.

Confidentiality

C.

Non-repudiation

D.

Integrity

Buy Now
Questions 120

System capabilities designed to detect and prevent unauthorized use and transmission of information are known as:

Options:

A.

SOC

B.

SIEM solutions

C.

Data Loss Prevention

D.

Cryptography

Buy Now
Exam Code: CC
Exam Name: CC - Certified in Cybersecurity
Last Update: Feb 14, 2026
Questions: 403

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now CC testing engine

PDF (Q&A)

$31.5  $104.99
buy now CC pdf
dumpsmate guaranteed to pass

24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 14 Feb 2026