ISC2 CC Exam Practice Questions
This is a practice questions based on ISC2 CC syllabus and it is not a guarantee that taking
this will make you pass. It is just to test your preparedness and readiness for the exam. I
wish you success as you proceed. The exam is arranged based on domains the way ISC2
stated in the course syllabus, but your actual exam might not be that way.
Instructions
1. Time yourself 120 Minutes for 90 Questions
2. No cheating, find out your score at the end.
3. If you fail a question or multiple questions in a domain, it means you need to read more
about that topic or area.
4. When you are done, go back to the video that linked you here and comment your score-
pass or fail
5. You have only one attempt for this test, if you wish to take it again, you'd have to take
start the process again which requires paying for access. It is advisable to take this test
pre study to test your initial knowledge and when you are throught reading to test your
knowledge before exam.
6. Good luck
monsur.sokunbi@gmail.com Switch account Draft saved
* Indicates required question
Email *
Record monsur.sokunbi@gmail.com as the email to be included with my response
What is your Confidence level starting this test? 0 points
0%
50%
100%
Not sure- Tensed
Clear selection
Which of the following best describes the CIA triad? 0 points
Confidentiality, Integrity, Availability
Confidentiality, Integrity, Accountability
Confidentiality, Integrity, Authentication
Confidentiality, Identification, Availability
What is the primary goal of information assurance? 0 points
To protect against all types of cyber threats
To ensure that data is available to all users
To maintain the confidentiality, integrity, and availability of information
To ensure that only authorized users can access data
Which of the following ensures that data has not been altered? 0 points
Availability
Confidentiality
Integrity
Non-repudiation
Which security concept is focused on ensuring that systems are accessible 0 points
to authorized users when needed?
Confidentiality
Integrity
Availability
Authentication
Which term refers to the assurance that an individual or system is who they 0 points
claim to be?
Authorization
Authentication
Accountability
Auditing
What is the first step in the risk management process? 0 points
Risk mitigation
Risk assessment
Risk identification
Risk monitoring
Which of the following is a quantitative risk assessment method? 0 points
Probability analysis
Qualitative analysis
Cost-benefit analysis
Risk avoidance
What is risk mitigation? 0 points
Transferring risk to a third party
Reducing the impact or likelihood of a risk
Accepting the risk and continuing operations
Ignoring the risk
Which risk management strategy involves the transfer of risk to another 0 points
party, such as through insurance?
Risk avoidance
Risk transference
Risk mitigation
Risk acceptance
In the context of risk management, what does the term “residual risk” refer 0 points
to?
The risk that remains after all risk management efforts have been applied
The total risk before any risk management is applied
The risk that is transferred to a third party
The risk that is accepted by an organization
Which of the following is a preventative security control? 0 points
Firewalls
Backup systems
Incident response plans
Security audits
Which type of security control is designed to detect security incidents as 0 points
they occur?
Preventative
Detective
Corrective
Deterrent
Which of the following is an example of a physical security control? 0 points
Encryption
Firewalls
Security guards
Access control lists (ACL
s)undefined
What is the main purpose of corrective security controls? 0 points
To prevent security incidents
To detect security incidents
To recover from security incidents
To deter security incidents
What is the primary role of information security governance? 0 points
To implement technical security measures
To ensure alignment of security strategies with business objectives
To monitor and audit security systems
To manage day-to-day security operations
Which control type focuses on preventing unauthorized access to 0 points
resources?
Detective
Preventative
Corrective
Recovery
Which of the following is an example of a security policy? 0 points
A document outlining acceptable use of company resources
An application firewall
A security breach response plan
A disaster recovery plan
Who is typically responsible for approving an organization’s security 0 points
policies?
IT department
Security operations center
Senior management
Human resources
Which governance framework is commonly used to manage and govern IT 0 points
services?
COBIT
ITIL
ISO 27001
NIST
Which of the following is NOT a component of the governance framework? 0 points
Security policy
Risk assessment
Technical controls
Compliance requirements
Which of the following is a core principle of the ISC2 Code of Ethics? 0 points
Act honorably, justly, responsibly, and legally
Protect the company’s interest above all else
Report any security incidents to the ISC2 immediately
Always follow company policy without question
Which statement aligns with the ISC2 Code of Ethics’ principle of “Advance 0 points
and protect the profession”?
Sharing knowledge with peers and the public
Maintaining confidentiality of all company information
Focusing on personal career advancement
Ignoring unethical behavior by colleagues
According to the ISC2 Code of Ethics, what should be done when a conflict 0 points
of interest arises?
It should be ignored
It should be disclosed to the relevant parties
It should be resolved internally without disclosure
It should be reported to the public
Which of the following is NOT a principle of the ISC2 Code of Ethics? 0 points
Protect society, the common good, necessary public trust, and confidence
Act honorably, honestly, justly, responsibly, and legally
Provide diligent and competent service to principals
Always prioritize profit over ethical considerations
How should a certified professional respond if they become aware of 0 points
unethical behavior in the workplace?
Ignore it if it does not involve them directly
Report it to the appropriate authority
Discuss it only with trusted colleagues
Take no action unless directed by management
What is the primary goal of an incident response plan? 0 points
To prevent all incidents from occurring
To detect and respond to incidents quickly and effectively
To recover data after an incident
To notify law enforcement of all incidents
Which of the following is the first step in the incident response process? 0 points
Containment
Identification
Eradication
Recovery
During which phase of incident response are actions taken to prevent an 0 points
incident from spreading?
Identification
Containment
Eradication
Recovery
Which of the following is NOT a common activity during the recovery phase 0 points
of incident response?
Restoring systems to normal operation
Monitoring for signs of re-infection
Performing a root cause analysis
Implementing preventative measures
What is the primary focus of the post-incident review? 0 points
To identify the responsible parties
To improve future incident response efforts
To restore affected systems
To report the incident to authorities
What is the primary goal of business continuity planning? 0 points
To protect the organization’s reputation
To ensure critical business functions can continue during a disruption
To prevent data breaches
To recover data after a disaster
Which of the following is a key component of a business continuity plan? 0 points
Incident response procedures
Data backup strategy
Employee training program
Risk assessment
Which type of analysis is used to identify critical business functions and the 0 points
impact of a disruption?
Risk analysis
Business impact analysis (BIA)
Threat analysis
Gap analysis
What is the primary purpose of a business impact analysis (BIA)? 0 points
To identify potential threats to business operations
To assess the financial impact of a business disruption
To prioritize the recovery of business functions
To develop a risk management plan
Which of the following is NOT a typical element of a business continuity 0 points
plan?
Recovery time objectives (RTO
Data encryption protocols
Emergency response procedures
Communication plans
What is the main focus of disaster recovery planning? 0 points
To ensure business functions continue during a disruption
To restore IT systems and data after a disaster
To prevent disasters from occurring
To assess the impact of potential disasters
Which of the following best describes the concept of a recovery point 0 points
objective (RPO)?
The maximum tolerable period in which data might be lost
The time it takes to restore a system after a disaster
The point at which a system can be brought online after a disaster
The maximum amount of time a system can be down
Which type of site is fully equipped with all necessary hardware and 0 points
software and can be used immediately after a disaster?
Cold site
Warm site
Hot site
Backup site
What is a common method used to back up data to ensure it can be 0 points
restored after a disaster?
Full backup
Incremental backup
Differential backup
All of the above
Which of the following is NOT a consideration when developing a disaster 0 points
recovery plan?
Data backup frequency
Employee training on DR procedures
Legal and regulatory requirements
Daily operational procedures
Why is effective communication critical during incident response? 0 points
To prevent further incidents
To ensure all stakeholders are informed and coordinated
To avoid legal liability
To notify customers of breaches
Which of the following is a best practice for communicating during a 0 points
business continuity event?
Rely solely on email for communication
Use a variety of communication channels
Limit communication to upper management only
Communicate only after the event has been resolved
What is the purpose of a communication plan in a disaster recovery 0 points
strategy?
To ensure that all employees know their roles during a disaster
To coordinate with external stakeholders
To communicate recovery steps and status updates
All of the above
Which communication method is often used as a backup when traditional 0 points
communication systems are down?
Email
Satellite phones
Social media
Landline phones
What is the main reason for keeping an updated contact list in a 0 points
communication plan?
To notify employees of upcoming meetings
To ensure that the right people are contacted during an incident
To keep track of employee phone numbers
To assist in the hiring process
How often should an incident response plan be tested and updated? 0 points
Once a year
Every six months
Whenever there are significant changes to the system
All of the above
What is the purpose of conducting a tabletop exercise? 0 points
To train employees on the use of new software
To simulate a potential incident in a controlled environment
To conduct a full-scale test of the incident response plan
To evaluate the effectiveness of business processes
Which of the following is a key outcome of reviewing and revising a 0 points
business continuity plan?
Ensuring the plan remains relevant and effective
Reducing the need for employee training
Eliminating the possibility of business disruptions
Avoiding legal requirements
Which type of exercise involves a real-world test of the disaster recovery 0 points
plan?
Tabletop exercise
Full-scale exercise
Walkthrough drill
Orientation session
What should be done if gaps are identified during the testing of a disaster 0 points
recovery plan?
Document the gaps but make no changes
Immediately revise the plan to address the gaps
Wait until the next review cycle to make changes
Ignore the gaps if the test was successful
What is the primary goal of security architecture in an organization? 0 points
To align security strategies with business goals
To implement firewalls and other security technologies
To reduce the cost of security operations
To comply with industry regulations
Which of the following is a core principle of secure design? 0 points
Open design
Least privilege
Complex passwords
Single point of failure
What is the concept of "defense in depth"? 0 points
Using a single strong security measure to protect assets
Implementing multiple layers of security controls
Relying on encryption to protect data
Placing all security measures at the network perimeter
Which of the following best describes the principle of least privilege? 0 points
Granting users the minimum level of access necessary to perform their job functions
Granting users access to all resources in case they need it
Restricting all user access to prevent security breaches
Allowing users to access any system as long as they authenticate
Which principle states that systems should be designed to fail in a secure 0 points
manner?
Fail-safe defaults
Separation of duties
Economy of mechanism
Defense in depth
Which security model is based on the concept of a secure state machine? 0 points
Bell-LaPadula Model
Biba Model
Clark-Wilson Model
Brewer-Nash Model
What is the primary focus of the Bell-LaPadula security model? 0 points
Integrity
Confidentiality
Availability
Authentication
In the Biba Model, what is the primary concern? 0 points
Ensuring data integrity
Preventing unauthorized access
Maintaining data confidentiality
Achieving system availability
Which security model emphasizes the integrity of transactions through well- 0 points
formed transactions and separation of duties?
Bell-LaPadula Model
Biba Model
Clark-Wilson Model
Brewer-Nash Model
Which of the following is a characteristic of the Brewer-Nash (Chinese Wall) 0 points
Model?
It prevents conflict of interest by restricting access to certain datasets
It focuses on ensuring the confidentiality of data
It is designed to manage hierarchical data access
It enforces mandatory access controls
What is the primary purpose of a Trusted Computing Base (TCB)? 0 points
To enforce security policies within a system
To provide redundancy for critical systems
To manage user authentication
To monitor network traffic
Which of the following best describes a reference monitor in the context of 0 points
information security?
A hardware device that filters network traffic
A software component that enforces access control policies
A user interface for managing security settings
A logging tool for tracking user activities
What is the role of the security kernel in an operating system? 0 points
To manage system resources
To enforce the system's security policies
To provide user authentication
To facilitate communication between hardware and software
Which concept involves separating the system's critical security functions 0 points
from other non-essential functions?
Layering
Isolation
Data hiding
Abstraction
What does the term "security perimeter" refer to in information security? 0 points
The boundary within which all security controls are enforced
The physical boundaries of a data center
The area covered by surveillance cameras
The firewall rules that define allowed network traffic
What is the primary purpose of cryptography? 0 points
To ensure data is stored securely
To protect information by transforming it into an unreadable format
To improve network performance
To enforce user authentication
Which of the following is an example of symmetric encryption? 0 points
RSA
AES
DSA
ECC
What is the main difference between symmetric and asymmetric 0 points
encryption?
Symmetric encryption uses the same key for encryption and decryption, while
asymmetric encryption uses a pair of keys
Symmetric encryption is slower than asymmetric encryption
Symmetric encryption is used only for digital signatures
Asymmetric encryption cannot be used for encrypting data
Which cryptographic method is typically used for creating digital signatures? 0 points
Hashing
Symmetric encryption
Asymmetric encryption
Steganography
What is the primary purpose of a cryptographic hash function? 0 points
To encrypt data
To generate a unique fingerprint of data
To create digital certificates
To manage encryption keys
What is the primary role of security operations in an organization? 0 points
To develop security policies and procedures
To monitor and respond to security incidents
To ensure compliance with regulations
To implement security technologies
Which of the following is a common task of security operations? 0 points
Performing regular security audits
Designing network architecture
Writing security policies
Conducting user training sessions
What is the purpose of a Security Operations Center (SOC)? 0 points
To provide a central location for monitoring and managing security incidents
To serve as a backup facility in case of a disaster
To manage the organization's public relations
To oversee compliance with industry standards
Which of the following best describes an intrusion detection system (IDS)? 0 points
A system that blocks unauthorized access attempts
A system that monitors network traffic for suspicious activity
A system that encrypts data for secure transmission
A system that authenticates users
What is a key benefit of security automation in security operations? 0 points
It reduces the need for skilled security personnel
It increases the speed and efficiency of incident response
It eliminates all security threats
It decreases the cost of security technologies
What is the primary purpose of a security assessment? 0 points
To identify vulnerabilities and risks within an organization's systems
To replace outdated security technologies
To improve the efficiency of security operations
To enforce user compliance with security policies
Which of the following is a common method used in security testing? 0 points
Penetration testing
Data mining
Network sniffing
Software development
What is the difference between a vulnerability scan and a penetration test? 0 points
A vulnerability scan identifies potential weaknesses, while a penetration test exploits
them to determine actual risk
A vulnerability scan is manual, while a penetration test is automated
A vulnerability scan focuses on physical security, while a penetration test focuses on
network security
A vulnerability scan requires user authentication, while a penetration test does not
What is the primary goal of penetration testing? 0 points
To find and exploit vulnerabilities to assess the impact of potential attacks
To monitor network traffic for unusual activity
To enforce compliance with security policies
To train employees on security best practices
Which of the following describes black-box testing? 0 points
Testing with no prior knowledge of the system's internal workings
Testing with full knowledge of the system's design and implementation
Testing focused on input and output without regard to internal code
Testing that involves the end-users of the system
What is the purpose of a security audit? 0 points
To review and evaluate an organization's adherence to security policies and
standards
To implement new security technologies
To enforce encryption on all data
To monitor network traffic for malicious activity
Which of the following is typically reviewed during a security audit? 0 points
Security policies and procedures
Network bandwidth usage
Employee attendance records
Hardware performance metrics
What is the difference between an internal and external security audit? 0 points
An internal audit is conducted by the organization's own staff, while an external audit
is conducted by a third party
An internal audit focuses on physical security, while an external audit focuses on
digital security
An internal audit is mandatory, while an external audit is optional
An internal audit is performed annually, while an external audit is performed monthly
Why is it important to have audit trails in security systems? 0 points
To provide a record of system activities for analysis and accountability
To reduce system downtime
To optimize network performance
To ensure compliance with data privacy regulations
What is the purpose of a security audit report? 0 points
To document findings, recommendations, and compliance status after an audit
To initiate security incident response
To deploy new security technologies
To create user access logs
What is the primary purpose of log management in security? 0 points
To collect and analyze logs for detecting and responding to security incidents
To improve system performance
To monitor employee productivity
To archive old data for long-term storage
Which of the following best describes log aggregation? 0 points
The process of collecting and centralizing logs from multiple sources
The process of compressing log files to save storage space
The manual review of individual log entries
The use of logs to train machine learning models
What is the importance of time synchronization in log management? 0 points
To ensure that logs from different systems can be correlated accurately
To optimize the speed of log collection
To reduce the size of log files
To prevent unauthorized access to logs
Which type of security tool is primarily used for monitoring logs in real time? 0 points
Security Information and Event Management (SIEM)
Intrusion Prevention System (IPS)
Firewall
Antivirus software
Why is it important to secure log files? 0 points
To prevent tampering and unauthorized access that could undermine the integrity of
the logs
To reduce storage costs
To comply with data retention policies
To ensure that logs are always available for performance monitoring
Submit Page 1 of 1 Clear form
This content is neither created nor endorsed by Google. - Terms of Service - Privacy Policy
Does this form look suspicious? Report
Forms