Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CC - Certified in Cybersecurity

Last Update 16 hours ago Total Questions : 403

The CC - Certified in Cybersecurity content is now fully updated, with all current exam questions added 16 hours ago. Deciding to include CC practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CC exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CC sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CC - Certified in Cybersecurity practice test comfortably within the allotted time.

Question # 1

Which one of the following cryptographic algorithms does NOT depend upon the prime factorization problem?

A.

RSA – Rivest-Shamir-Adleman

B.

GPG – GNU Privacy Guard

C.

ECC – Elliptic Curve Cryptosystem

D.

PGP – Pretty Good Privacy

Question # 2

Which of the following is often associated with Disaster Recovery planning?

A.

Checklists

B.

Antivirus

C.

Firewalls

D.

All

Question # 3

Which is NOT a possible model for an Incident Response Team (IRT)?

A.

Leveraged

B.

Dedicated

C.

Hybrid

D.

Outsourced

Question # 4

What is the purpose of the post-incident phase?

A.

Detection and analysis

B.

Preparation

C.

Lessons learned and improvement

D.

Containment and eradication

Question # 5

Protection against an individual falsely denying having performed a particular action.

A.

Authentication

B.

Identification

C.

Verification

D.

Non-repudiation

Question # 6

Ping flood attacks target which OSI layer?

A.

Layer 4

B.

Layer 3

C.

Layer 5

D.

Layer 6

Question # 7

XenServer, LVM, Hyper-V, and ESXi are:

A.

Type 2 hypervisors

B.

Type 1 hypervisors

C.

Both

D.

None

Question # 8

What is the first component the new security engineer should learn about in the incident response plan?

A.

Detection and analysis

B.

Preparation

C.

Containment

D.

Eradication

Question # 9

Embedded systems and network-enabled devices that communicate with the Internet are considered:

A.

Endpoint

B.

Node

C.

IoT

D.

Router

Question # 10

In Mandatory Access Control (MAC), which statement is true?

A.

Users access data based on need-to-know

B.

Access controls cannot be changed except by administrators

C.

Data owners modify access

D.

Users control permissions

Go to page: