ISC2 CERTIFICATION IN
CYBERSECURITY (CC) EXAM 2024-2025
QUESTIONS AND DETAILED CORRECT
ANSWERS
What is the risk associated with delaying resumption of full
normal operations after a disaster?
A. People might be put in danger
B. The impact of running alternate operations for extended
periods
C. A new disaster might emerge
D. Competition Correct Answer B. The impact of running
alternate operations for extended periods
You are reviewing log data from a router; there is an entry
that shows a user sent traffic through the router at 11:45
am, local time, yesterday. This is an example of a(n)
_______.
A. Incident
B. Event
C. Attack
D. Threat Correct Answer B. Event
Which of the following are not typically involved in incident
detection?
A. Users
B. Security analysts
C. Automated tools
,D. Regulators Correct Answer D. Regulators
Prachi works as a database administrator for Triffid, Inc.
Prachi is allowed to add or delete users, but is not allowed
to read or modify the data in the database itself. When
Prachi logs onto the system, an access control list (ACL)
checks to determine which permissions Prachi has.
In this situation, what is the database?
A. The object
B. The rule
C. The subject
D. The site Correct Answer The object
Gelbi is a Technical Support analyst for Triffid, Inc. Gelbi
sometimes is required to install or remove software. Which
of the following could be used to describe Gelbi's account?
A. Privileged
B. Internal
C. External
D. User Correct Answer A. Privileged
A human guard monitoring a hidden camera could be
considered a ______ control.
A. Detective
B. Preventive
C. Deterrent
D. Logical Correct Answer A. Detective
In order for a biometric security to function properly, an
authorized person's physiological data must be ______.
A. Broadcast
,B. Stored
C. Deleted
D. Modified Correct Answer B. Stored
A _____ is a record of something that has occurred.
A. Biometric
B. Law
C. Log
D. Firewall Correct Answer C. Log
Trina and Doug both work at Triffid, Inc. Doug is having
trouble logging into the network. Trina offers to log in for
Doug, using Trina's credentials, so that Doug can get
some work done.
What is the problem with this?
A. Doug is a bad person
B. If Trina logs in for Doug, then Doug will never be
encouraged to remember credential without assistance
C. Anything either of them do will be attributed to Trina
D. It is against the law Correct Answer C. Anything either
of them do will be attributed to Trina
Which of the following is a biometric access control
mechanism?
A. A badge reader
B. A copper key
C. A fence with razor on it
D. A door locked by a voiceprint identifier Correct Answer
D. A door locked by a voiceprint identifier
Which of the following statements is true?
, A. Logical access controls can protect the IT environment
perfectly; there is no reason to deploy any other controls.
B. Physical access controls can protect the IT environment
perfectly; there is no reason to deploy any other controls.
C. Administrative access controls can protect the IT
environment perfectly; there is no reason to deploy any
other controls.
D. It is best to use a blend of controls in order to provide
optimum security. Correct Answer D. It is best to use a
blend of controls in order to provide optimum security.
Which of the following would be considered a logical
access control?
A. An iris reader that allows an employee to enter a
controlled area.
B. A fingerprint reader that allows an employee to enter a
controlled area.
C. A fingerprint reader that allows an employee to access
a laptop computer.
D. A chain attached to a laptop computer that connects it
to furniture so it cannot be taken. Correct Answer C. A
fingerprint reader that allows an employee to access a
laptop computer.
Which of the following is probably most useful at the
perimeter of a property?
A. A safe
B. A fence
C. A data center
D. A centralized log storage facility Correct Answer B. A
fence
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TUTORWAC. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $22.99. You're not tied to anything after your purchase.