• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Exam Questions Latest Update -

EXAMS AND CERTIFICATIONS Dec 14, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

ISC2 Certified In Cybersecurity (CC) Practice Exam Questions Latest Update - Exam Questions and 100% Verified Correct Answers Guaranteed A+

______ is used to ensure that configuration management activities are effective and enforced.

  • Inventory
  • Baseline
  • Identification

D. Verification and audit - CORRECT ANSWER: D. Verification and audit

"Wiring _____" is a common term meaning "a place where wires/conduits are often run, and equipment can be placed, in order to facilitate the use of local networks."

  • Shelf
  • Closet
  • Bracket

D. House - CORRECT ANSWER: B. Closet

(ISC)² publishes a Common Body of Knowledge (CBK) that IT security practitioners should be familiar with; this is recognized throughout the industry as a set of material that is useful for practitioners to refer to. Certifications can be issued for demonstrating expertise in this Common Body of Knowledge. What kind of document is the Common Body of Knowledge?

  • Policy
  • Procedure
  • Standard

D. Law - CORRECT ANSWER: C. Standard

A _____ is a record of something that has occurred.

  • Biometric
  • Law
  • Log

D. Firewall - CORRECT ANSWER: C. Log

A bollard is a post set securely in the ground in order to prevent a vehicle from entering an area or driving past a certain point. Bollards are an example of ______ controls.

  • Physical
  • Administrative
  • Drastic

D. Technical - CORRECT ANSWER: A. Physical

A device that filters network traffic in order to enhance overall security/performance.

  • Endpoint 1 / 3
  • Laptop
  • MAC (media access control)

D. Firewall - CORRECT ANSWER: D. Firewall

A device that is commonly useful to have on the perimeter between two networks.

  • User laptop
  • IoT
  • Camera

D. Firewall - CORRECT ANSWER: D. Firewall

A device typically accessed by multiple users, often intended for a single purpose, such as managing email or web pages.

  • Router
  • Switch
  • Server

D. Laptop - CORRECT ANSWER: C. Server

A human guard monitoring a hidden camera could be considered a ______ control.

  • Detective
  • Preventive
  • Deterrent

D. Logical - CORRECT ANSWER: A. Detective

A means to allow remote users to have secure access to the internal IT environment.

  • Internet

B. VLAN

C. MAC

D. VPN - CORRECT ANSWER: D. VPN

A software firewall is an application that runs on a device and prevents specific types of traffic from entering that device. This is a type of ________ control.

  • Physical
  • Administrative
  • Passive

D. Technical - CORRECT ANSWER: D. Technical

A system that collects transactional information and stores it in a record in order to show which users performed which actions is an example of providing ________.

  • Non-repudiation
  • Multifactor authentication
  • Biometrics

D. Privacy - CORRECT ANSWER: A. Non-repudiation

A tool that aggregates log data from multiple sources, and typically analyzes it and reports potential threats.

A. HIDS 2 / 3

  • Anti-malware
  • Router

D. SIEM - CORRECT ANSWER: D. SIEM

A tool that filters inbound traffic to reduce potential threats.

  • NIDS (network-based intrusions-detection systems)
  • Anti-malware
  • DLP (data loss prevention)

D. Firewall - CORRECT ANSWER: D. Firewall

A tool that inspects outbound traffic to reduce potential threats.

  • NIDS (network-based intrusion-detection systems)
  • Anti-malware
  • DLP (data loss prevention)

D. Firewall - CORRECT ANSWER: C. DLP (data loss provention)

A tool that monitors local devices to reduce potential threats from hostile software.

  • NIDS (network-based intrusion-detection systems
  • Anti-malware
  • DLP (data loss prevention)

D. Firewall - CORRECT ANSWER: B. Anti-malware

A vendor sells a particular operating system (OS). In order to deploy the OS securely on different platforms, the vendor publishes several sets of instructions on how to install it, depending on which platform the customer is using. This is an example of ______.

  • Law
  • Procedure
  • Standard

D. Policy - CORRECT ANSWER: B. Procedure

A VLAN is a _____ method of segmenting networks.

  • Secret
  • Physical
  • Regulated

D. Logical - CORRECT ANSWER: D. Logical

All of the following are important ways to practice an organization disaster recovery (DR) effort; which one is the most important?

  • Practice restoring data from backups
  • Facility evacuation drills
  • Desktop/tabletop testing of the plan
  • Running the alternate operating site to determine if it could handle critical function in

time of emergency - CORRECT ANSWER: B. Facility evacuation drills

All of the following are typically perceived as drawbacks to biometric systems, except:

  • Lack of accuracy
  • / 3

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

With its detailed explanations, this document enhanced my understanding. Definitely a superb choice!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: EXAMS AND CERTIFICATIONS
Added: Dec 14, 2025
Description:

ISC2 Certified In Cybersecurity (CC) Practice Exam Questions Latest Update - Exam Questions and 100% Verified Correct Answers Guaranteed A+ ______ is used to ensure that configuration management ac...

Unlock Now
$ 1.00