CS/IT MCQ Collections

Top 100 PROVEN Questions To PASS Your ISC2 CC Exam set-4

Pinterest LinkedIn Tumblr
Are you willing to pass your ISC2 CC exam this year? If so, you’ve come to the correct page. In this post, I will share the tried-and-true questions I practiced while studying for the ISC2 CC exam. After practicing with these questions, I am sure that you can pass your ISC2 CC exam this year. It is the fourth set of the top 100 ISC2 CC exam preparation questions set series.

This article includes objective questions about fundamental cybersecurity principles, the risk management process, several security measures, governance elements, and the ISC2 code of ethics from the first domain. This article also includes MCQ questions on business continuity (BC), disaster recovery (DR), incident response concepts, access control concepts, network security concepts, and security operations concepts from the second to the fifth domain.

Please practice the following questions before clicking the “View Answer” button to find the correct answer. It includes the correct answer as well as the explanation behind it. You might be able to prepare better to pass your ISC2 CC exam.

1. Addressing a problem in a software product is referred to
A. Hotfix
B. Service Pack
C. Software Patch
D. Downgrade

Answer: A. Hotfix

Explanation: A hotfix or quickfix engineering update is a cumulative package which includes information that will be used to address a problem in software product.

2. A quick repair job for a piece of programming is known as
A. Hotfix
B. Downgrade
C. Service Pack
D. Software Patch

Answer: D. Software Patch

Explanation: Software patches are rapid fixes for programming that are intended to fix problems with functionality, enhance security, and introduce new features.

3. Which of these documents is a contract between a service provider and a customer?
A. ROE
B. MOU
C. MOA
D. SLA

Answer: D. SLA

Explanation: A Service Level Agreement (SLA) is an agreement between a service provider and a customer that defines service-related guarantees or warranties.

4. Which of the following ensures that an organization does not become vulnerable to further attacks?
A. ROE
B. MOU
C. MOA
D. SLA

Answer: A. ROE

Explanation: Rules of Engagement (ROE) ensure that an organization does not become vulnerable to further attacks while defending itself from an ongoing attack.

5. Which kind of document outlines the method of analyzing how much disruptions can affect an organization?
A. Disaster Recovery Plan
B. Business Continuity Plan
C. Business Impact Plan
D. Business Impact Analysis

Answer: D. Business Impact Analysis

Explanation: A business impact analysis (BIA) is a technique used to assess the potential impact of disruptions on an organization.

Read Also: Top 100 Must-Know MCQ Questions to Pass your ISC2 CC Exam set-1

6. Which of these social engineering attacks corrupts an infrastructure service such as Domain Name System (DNS)?
A. Spear Phishing
B. Pharming
C. Vishing
D. Whaling

Answer: B. Pharming

Explanation: A pharming attack corrupts an infrastructure service such as DNS, which causes traffic to be misdirected to a forged site.

7. Which of the following is protected by regulations such as GDPR, HIPPA, and PCI-DSS?
A. Protected Health Information (PHI)
B. Secure Credit Cards Payments (SCCP)
C. Personally Identifiable Information (PII)
D. Pubically Identifiable Information (PII)

Answer: C. Personally Identifiable Information (PII)

Explanation: Personally Identifiable Information (PII) is any information that is capable of identifying an individual, which is protected by regualtions, such as GDPR (in the EU) and HIPPA and PCI-DSS (in the US).

8. Which of these is an attack whose primary goal is to demand a ransom?
A. DDOS
B. Spoofing
C. Amplification
D. Ransomware

Answer: D. Ransomware

Explanation: Ransomeware attacks typically encrypt a target systems data, and then demand a ransom in exchange for the decryption code.

9. Which of the following attacks exploits the information leaked through non-traditional channels?
A. Ping of death
B. Side-channel
C. APT
D. Rootkit

Answer: B. Side-channel

Explanation: Side-channel attacks exploit information leaked through non-traditional channels (such as power consumption, electromagnetic emissions or physical timing) in order to gain access to sensitive information or perform other malicious actions.

10. Which of these terms refers to threats that involve sending a maliciously large ping packet to the target system?
A. Ping of death
B. Side-channel
C. APT
D. Rootkit

Answer: A. Ping of death

Explanation: A ping of death is a form of denial of service (DOS) attack that includes delivering a maliciously huge ping packet to the target system in order to overload it.

Read Also: Ready to Pass your ISC2 CC Exam? Get 100 Frequently Asked Questions set-2

11. An organization needs a network security tool that detects in the event of malicious activity. Which of these tools will BEST meet their requirements?
A. Router
B. Firewall
C. IDS
D. IPS

Answer: C. IDS

Explanation: An intrusion detection system (IDS) is designed to monitor network traffic in real-time for identifying patterns or behaviors which indicates an attempted intrusion or other malicious activity.

12. Which of the following documents are created by governments or national authorities?
A. Standards
B. Guidelines
C. Regulations
D. Policies

Answer: C. Regulations

Explanation: Regulations are created by governments or national agencies and frequently result in financial penalties for violations.

13. What does the term WAN refer to?
A. A long-distance connection between geographically distant networks.
B. A device that connects multiple other devices in a network.
C. A network on a building or limited geographical area.
D. A tool to manage and control network traffic, as well as to protect the network.

Answer: A. A long-distance connection between geographically distant networks.

Explanation: A long-distance connection between geographically distant networks is called a wide area network (WAN).

14. Which of these is a type of detective security control?
A. Encryption
B. Guidelines
C. Intrusion Detection System
D. Patches

Answer: C. Intrusion Detection System

Explanation: Intrusion Detection System (IDS) are detective security controls that monitors the given system for unwanted activity.

15. Which of the following OSI layers is responsible for establishing, maintaining, and terminating connections between different devices on a network?
A. Physical Layer
B. Session Layer
C. Application Layer
D. Transport Layer

Answer: B. Session Layer

Explanation: The session layer of OSI model is responsible for establishing, maintaining, and terminating connections between different devices on a network.

Read Also: Top 100 Must-Know Questions to Pass Your ISC2 CC Exam Set-3

16. Which of the following statements about IPV6 is NOT true?
A. IPv6 can have an insecure version
B. IPv6 does not include network address translation (NAT)
C. IPv6 traffic may bypass many existing IPv4 security tools
D. Assigning static address less useful for IPv6 address

Answer: A. IPv6 can have an insecure version

Explanation: IPv6 address doesn’t have any insecure version but the IPv4 has unsecure version.

17. Which of these is an example of technical access control?
A. Firewalls
B. Turnstiles
C. Movement sensors
D. Bollards

Answer: A. Firewalls

Explanation: Firewalls are network devices used to filter network traffic. So it is considered as technical control.

18. Which cloud service model provides access to their customers, typically on a subscription-based or pay-per-use model?
A. PaaS
B. IaaS
C. SLA
D. SaaS

Answer: D. SaaS

Explanation: Software as a service (SaaS) is a model that provides customers with access to software applications, typically on a subscription-based or pay-per-use model.

19. Which of the following cloud service models provides a platform for building, deploying, and managing applications?
A. Infrastructure as a Service
B. Platform as a Service
C. Software as a Service
D. Applications as a Service

Answer: B. Platform as a Service

Explanation: Platform as a Service (PaaS) is a cloud service models provides a platform for building, deploying, and managing applications.

20. Which of the following IP addresses is commonly reserved for the network itself?
A. 192.168.20.1
B. 192.152.0.20
C. 192.299.20.0
D. 192.121.20.255

Answer: C. 192.299.20.0

Explanation: IP addresses ending with zero are reserved to represent the network itself and not a specific device on that network.

Please follow and like us:
RSS
Follow by Email
X (Twitter)
Visit Us
Follow Me
YouTube
YouTube
LinkedIn
linkedIn | Top 100 PROVEN Questions To PASS Your ISC2 CC Exam set-4
Share

Author

Shuseel Baral is a web programmer and the founder of InfoTechSite has over 8 years of experience in software development, internet, SEO, blogging and marketing digital products and services is passionate about exceeding your expectations.

Write A Comment

RSS
Follow by Email
X (Twitter)
Visit Us
Follow Me
YouTube
YouTube
LinkedIn
Share