CS/IT MCQ Collections

ISC2 CC Exam Questions and Answers With Clear Explanation Set-5

Pinterest LinkedIn Tumblr
Do you want to pass your ISC2 CC exam this year? If that is the case, you are on the correct page. This post includes tried-and-true ISC2 CC exam questions and answers that I practiced when studying for the ISC2 CC test. After preparing with these questions, I am confident that you will pass your ISC2 CC exam this year. It is the final set in the top 100 ISC2 CC test practice questions set series.

This article contains CC exam questions and answers regarding core cybersecurity principles, the risk management process, several security measures, governance elements, the ISC2 code of ethics, business continuity (BC), disaster recovery (DR), incident response concepts, access control ideas, network security concepts, and security operations concepts referenced from the first to the fifth domain.

Please practice the following questions before clicking the “View Answer” button to find the correct answer. It includes CC exam questions and answers, including the explanation behind them. You might be able to prepare better to pass your exam.

1. Which of the following determines a device or user’s physical location, based on information obtained from the device’s IP or MAC address?
A. Localization
B. Ping sweep
C. Traceroute
D. Geolocation

Answer: D. Geolocation

Explanation: Geolocation is a process for determining a device or user’s physical location, based on information obtained from the device’s IP or MAC addres.

2. Which method is commonly used to determine the sequence of hops that the packets took to a given IP address?
A. Routing
B. Geolocation
C. Traceroute
D. Ping Sweep

Answer: C. Traceroute

Explanation: Traceroute is a method to determine the sequence of hops that the packets took to a given IP address.

3. Which tool can be used to view and analyze packets and contents, including the IP addresses and hostnames?
A. John the Ripper
B. Nessus
C. Wireshark
D. Telnet

Answer: C. Wireshark

Explanation: Wireshark is a network analyzer tool that can be used to view and analyze packets and contents, including the IP addresses and hostnames.

4. Which of the following methods should NOT be considered training?
A. Campaign
B. Lectures
C. Workshops
D. Online Courses

Answer: A. Campaign

Explanation: Campaign is the awareness program while the lectures, workshops and online courses focuses on building proficiency in a set of skills, so they are considered training.

5. Which of the following is a security strategy that assumes that all network traffic is potentially malicious and requires verification?
A. No trust
B. Zero Trust
C. Trusted Network
D. Secured Network

Answer: B. Zero Trust

Explanation: Zero trust is a security strategy that assumes that all network traffic is potentially malicious and requires verification.

Read Also: Top 100 Must-Know ISC2 CC Exam Questions and Answers Set-1

6. Which of these techniques creates a secure tunnel between endpoints?
A. Virtual Private Network (VPN)
B. Secure Network
C. Secure Tunnel Network (STN)
D. Encryption

Answer: A. Virtual Private Network (VPN)

Explanation: A Virtual Private Network (VPN) creates a secure tunnel between endpoints, and it ensures the confidentiality in transferring data.

7. Data sent over a network is an example of
A. Data in use
B. Data in transit
C. Data in rest
D. Data in motion

Answer: D. Data in motion

Explanation: Data sent over a network is an example of data in motion whereas data reside in storage media is called data in rest and data used by couputer system is called data in use.

8. Which of the following is an example of compensating control?
A. Backups
B. IDS
C. Encryption
D. Patches

Answer: A. Backups

Explanation: Backups are compensating controls since they provide redundancy for the information in a given system.

9. On an incident response team, which role focuses on internal and external communications?
A. Technical expert
B. Management
C. Communications and Public Relations
D. Information Security

Answer: C. Communications and Public Relations

Explanation: Communications and public relations staff focus on internal and external communications, that typically differ from the direct conduit to senior management.

10. Which of the following is NOT an effective way to protect an organization from cybercriminals?
A. Using Firewall
B. Using antivirus even expired
C. Using intrusion detection and prevention system
D. Removing and disabling unneeded services

Answer: B. Using antivirus even expired

Explanation: Using outdated antivirus software is not an effective way to protect an organization from cybercriminals.

Read Also: Get 100 Frequently Asked CC Exam Questions and Answers set-2

11. Which of these is an administrative security control that implements corrective measures in case of a disaster?
A. Business Continuity Plans
B. Disaster Recovery Plans
C. Patches
D. Backups

Answer: B. Disaster Recovery Plans

Explanation: Disaster Recovery Plans are administrative security controls which implements the corrective measures in case of disaster.

12. A plan to sustain business operations while recovering from a significant disruption is called…
A. Business Continuity Plan
B. Disaster Recovery Plan
C. Business Sustain Plan
D. Business Operation Plan

Answer: A. Business Continuity Plan

Explanation: A plan to sustain business operations while recovering from a significant disruption is called Business Continuity Plan.

13. Which port number corresponds to the SMTP that uses transport layer security (TLS)?
A. 25
B. 22
C. 587
D. 161

Answer: C. 587

Explanation: The port number 587 corresponds to the SMTP that uses transport layer security (TLS) to encrypt the data between the mail client and server.

14. Which type of attack compromises the availability of a system or service through a malicious overload of requests?
A. Phishing
B. Trojans
C. Denial of Service
D. Cross-site Scripting

Answer: C. Denial of Service

Explanation: A denial of service compromises the availability of a system or service through a malicious overload of requests.

15. Which term represents whether cloud resources can be scaled up or down quickly and automatically to meet changing demand?
A. Broad Network Access
B. Rapid Elasticity
C. Measured Service
D. Resource Pooling

Answer: B. Rapid Elasticity

Explanation: If cloud resources can be scaled up or down quickly and automatically to meet changing demand represented by the term rapid elasticity.

Read Also: Top 100 ISC2 CC Exam Questions and Answers You Must Know Set-3

16. Which of these cloud development models is a type of cloud infrastructure shared by organizations with similar needs?
A. Public
B. Hybrid
C. Private
D. Community

Answer: D. Community

Explanation: A community cloud is a type of cloud infrastructure shared by organizations with similar needs.

17. Which featured security information and event management (SIEM) involves identifying patterns, trends, and anomalies in security events?
A. Log Analysis
B. Log Encryption
C. Log Retention
D. Log Consolidation

Answer: A. Log Analysis

Explanation: Log analysis in security information and event management (SIEM) involves identifying patterns, trends, and anomalies in security events.

18. Which exercises attempt to thoroughly recreate an incident to test responses?
A. A checklist exercise
B. A tabletop exercise
C. A walk-through exercise
D. A simulation exercise

Answer: D. A simulation exercise

Explanation: A simulation exercise attempts to thoroughly recreate an incident to test responses.

19. Which of these documents are typically created by government agencies or regulatory bodies?
A. Regulations
B. Policies
C. Guidelines
D. Standards

Answer: A. Regulations

Explanation: Regulations are typically created by government agencies or regulatory bodies.

20. A targeted attack in which the attacker uses email or other digital communication to trick a specific individual or group into divulging sensitive information is called…
A. Phishing
B. Spear Phishing
C. Whaling
D. DDoS

Answer: B. Spear Phishing

Explanation: Spear phishing is a targeted attack in which the attacker uses email or other digital communication to trick a specific individual or group into divulging sensitive information.

Read Also: Top 100 Proven CC Exam Questions and Answers Set-4

Please follow and like us:
RSS
Follow by Email
X (Twitter)
Visit Us
Follow Me
YouTube
YouTube
LinkedIn
linkedIn | ISC2 CC Exam Questions and Answers With Clear Explanation Set-5
Share

Author

Shuseel Baral is a web programmer and the founder of InfoTechSite has over 8 years of experience in software development, internet, SEO, blogging and marketing digital products and services is passionate about exceeding your expectations.

Write A Comment

RSS
Follow by Email
X (Twitter)
Visit Us
Follow Me
YouTube
YouTube
LinkedIn
Share