• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

ISC2 CC Exam Questions Latest Update -

exam bundles Dec 14, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

ISC2 CC Exam Questions Latest Update - Questions and 100% Verified Correct Answers Guaranteed A+

______ is used to ensure that configuration management activities are effective and enforced. (D5.2, L5.2.1)

A)Inventory B)Baseline C)Identification D)Verification and audit - CORRECT ANSWER: Verification and audit are methods we use to review the IT environment to ensure that configuration management activities have taken place and are achieving their intended purpose. D is the correct answer. A, B and C are incorrect; while these are terms related to configuration management, the answer is verification and audit.

"Wiring _____" is a common term meaning "a place where wires/conduits are often run, and equipment can be placed, in order to facilitate the use of local networks." (D4.3

L4.3.1)

A)Shelf B)Closet C)Bracket D)House - CORRECT ANSWER: "Wiring closet" is the common term used to described small spaces, typically placed on each floor of a building, where IT infrastructure can be placed. A, C and D are incorrect; these are not common terms used in this manner.

A _____ is a record of something that has occurred. (D3, L3.2.1)

A)Biometric B)Law C)Log

D)Firewall - CORRECT ANSWER: C is correct. This is a description of a log. A is

incorrect; "biometrics" is a term used to describe access control systems that use physiological traits of individuals in order to grant/deny access. B is incorrect; laws are legal mandates. D is incorrect; a firewall is a device for filtering traffic.

A bollard is a post set securely in the ground in order to prevent a vehicle from entering an area or driving past a certain point. Bollards are an example of ______ controls. (D1,

L1.3.1)

A)Physical B)Administrative C)Drastic 1 / 3

D)Technical - CORRECT ANSWER: A is correct. A bollard is a tangible object that

prevents a physical act from occurring; this is a physical control. B and D are incorrect because the bollard is a physical control, not administrative or technical. C is incorrect: "drastic" is not a term commonly used to describe a particular type of security control, and is used here only as a distractor.

A device that filters network traffic in order to enhance overall security/performance.

(D4.1 L4.1.1)

A)Endpoint B)Laptop C)MAC (media access control) D)Firewall - CORRECT ANSWER: Firewalls filter traffic in order to enhance the overall security or performance of the network, or both. D is the correct answer. A is incorrect; "endpoint" is the term used to describe a device involved in a networked communication, at either "end" of a conversation. B is incorrect; laptops are not typically employed to filter network traffic. C is incorrect; MAC is the physical address of a device on a network.

A device that is commonly useful to have on the perimeter between two networks. (D4.3

L4.3.3)

A)User laptop B)IoT C)Camera D)Firewall - CORRECT ANSWER: Firewalls are often useful to monitor/filter traffic between two networks. D is correct. A and B are incorrect; these are typically located inside the perimeter of the internal environment. C is incorrect; cameras do not offer much benefit in monitoring communications traffic.

A device typically accessed by multiple users, often intended for a single purpose, such as managing email or web pages. (D4.1 L4.1.1)

A)Router B)Switch C)Server D)Laptop - CORRECT ANSWER: A server typically offers a specific service, such as hosting web pages or managing email, and is often accessed by multiple users. C is the correct answer. A and B are incorrect; routers and switches are used to vector network traffic, not to provide specific services. D is incorrect; a laptop is typically only assigned to a single user.

A means to allow remote users to have secure access to the internal IT environment.

(D4.3 L4.3.3)

A)Internet 2 / 3

B)VLAN

C)MAC

D)VPN - CORRECT ANSWER: D is correct; a virtual private network protects

communication traffic over untrusted media. A is incorrect; the internet is an untrusted medium. B is incorrect; VLANs are used to segment portions of the internal environment. C is incorrect; MAC is the physical address of a given networked device.

A software firewall is an application that runs on a device and prevents specific types of traffic from entering that device. This is a type of ________ control. (D1, L1.3.1)

A)Physical B)Administrative C)Passive

D)Technical - CORRECT ANSWER: D is correct. A software firewall is a technical

control, because it is a part of the IT environment. A is incorrect; a software firewall is not a tangible object that protects something. B is incorrect; a software firewall is not a rule or process. Without trying to confuse the issue, a software firewall might incorporate an administrative control: the set of rules which the firewall uses to allow or block particular traffic. However, answer D is a much better way to describe a software firewall. C is incorrect; "passive" is not a term commonly used to describe a particular type of security control, and is used here only as a distractor.

A system that collects transactional information and stores it in a record in order to show which users performed which actions is an example of providing ________. (D1, L1.1.1)

A)Non-repudiation B)Multifactor authentication C)Biometrics

D)Privacy - CORRECT ANSWER: A is correct. Non-repudiation is the concept that

users cannot deny they have performed transactions that they did, in fact, conduct. A system that keeps a record of user transactions provides non-repudiation. B and C are incorrect because nothing in the question referred to authentication at all. D is incorrect because non-repudiation does not support privacy (if anything, non-repudiation and privacy are oppositional).

A tool that filters inbound traffic to reduce potential threats. (D4.2 L4.2.3)

A)NIDS (network-based intrusion-detection systems) B)Anti-malware C)DLP (data loss prevention) D)Firewall - CORRECT ANSWER: Firewalls typically filter traffic originating from outside the organization's IT environment. D is the correct answer. A is incorrect; NIDS typically monitor traffic within the production environment. B is incorrect; anti-malware solutions typically identify hostile software. C is incorrect; DLP solutions typically monitor outbound traffic.

  • / 3

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

With its in-depth analysis, this document was a perfect resource for my project. Definitely a excellent choice!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: exam bundles
Added: Dec 14, 2025
Description:

ISC2 CC Exam Questions Latest Update - Questions and 100% Verified Correct Answers Guaranteed A+ ______ is used to ensure that configuration management activities are effective and enforced. (D5.2,...

Unlock Now
$ 1.00