Announcements
This ISC2 Community will be decommissioned as of May 29, 2026. Please join your peers and connect with your chapter at https://isc2chapters.isc2.org.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cecefeg
Viewer

CC Exam updated Questions

Q1 : A company wants to ensure users only have access to the resources necessary for their job roles.
What principle is being applied?

 

A. Defense in depth
B. Least privilege
C. Separation of duties
D. Zero trust

Answer: B

 

Q2 : Which control type is a firewall considered?

 

A. Administrative
B. Physical
C. Technical
D. Detective

Answer: C

 

Q3 : An employee clicks a malicious link that installs malware. What type of attack is this?

 

A. Phishing
B. Social engineering
C. Malware injection
D. Insider threat

Answer: A

 

Q4 : What is the FIRST step in incident response?

 

A. Containment
B. Identification
C. Eradication
D. Recovery

Answer: B

 

Q5 : Which of the following BEST ensures data can be recovered after a disaster?

 

A. Encryption
B. Backups
C. Access control
D. Monitoring

Answer: B

 

1 Reply
nkeaton
Advocate III

@kedeho8713. This is a dump site and should not be used. Anyone who posts or advocates use of a dump site risks losing Community access and/or their certification.