كويز محاكي لاختبار ISC2 CC (1)


Question 1 - Domain: Cyber Security Principles

Which of the following best defines an **asset** in the context of cybersecurity?

Question 2 - Domain: Cyber Security Principles

The equation "Risk = Threat + Vulnerability" best describes which cybersecurity concept?

Question 3 - Domain: Cyber Security Principles

Which principle of the CIA Triad focuses on preventing unauthorized disclosure of information?

Question 4 - Domain: Cyber Security Principles

Which security principle ensures that data is accurate and complete, and has not been modified or tampered with without authorization?

Question 5 - Domain: Cyber Security Principles

Which principle ensures that authorized users can access systems and data when needed?

Question 6 - Domain: Cyber Security Principles

Which security principle involves verifying the identity of a person or entity?

Question 7 - Domain: Cyber Security Principles

What is the primary goal of **Non-repudiation**?

Question 8 - Domain: Cyber Security Principles

What is a "vulnerability" in cybersecurity?

Question 9 - Domain: Cyber Security Principles

When dealing with highly sensitive data like patient records or bank card numbers, which principle of the CIA Triad is of utmost importance?

Question 10 - Domain: Cyber Security Principles

Which cybersecurity concept refers to any force or factor capable of causing harm to an asset?

Question 11 - Domain: Business Continuity, Disaster Recovery, and Incident Response

In incident management, what is an "incident" typically characterized as?

Question 12 - Domain: Business Continuity, Disaster Recovery, and Incident Response

What is an "exploit" in cybersecurity?

Question 13 - Domain: Business Continuity, Disaster Recovery, and Incident Response

During which phase of the Incident Response Lifecycle is the primary goal to stop the spread of an incident to prevent further damage?

Question 14 - Domain: Business Continuity, Disaster Recovery, and Incident Response

What is a "zero-day vulnerability"?

Question 15 - Domain: Business Continuity, Disaster Recovery, and Incident Response

The primary goal of a **Business Continuity (BC) plan** is to:

Question 16 - Domain: Business Continuity, Disaster Recovery, and Incident Response

What does **Recovery Point Objective (RPO)** define?

Question 17 - Domain: Business Continuity, Disaster Recovery, and Incident Response

The "Lessons Learned" phase of the Incident Response Lifecycle involves:

Question 18 - Domain: Business Continuity, Disaster Recovery, and Incident Response

Which of the following describes an "intrusion"?

Question 19 - Domain: Business Continuity, Disaster Recovery, and Incident Response

Which of the following is the core focus of a **Disaster Recovery (DR) plan**?

Question 20 - Domain: Business Continuity, Disaster Recovery, and Incident Response

If an organization's **Recovery Time Objective (RTO)** for a critical system is 4 hours, what does this mean?

Question 21 - Domain: Access Control Concepts

When a user logs in with a password and then receives a code on their phone to enter, this is an example of:

Question 22 - Domain: Access Control Concepts

In the context of Access Control, **Authorization** refers to:

Question 23 - Domain: Access Control Concepts

In which access control model does the owner of a resource directly grant permissions to others?

Question 24 - Domain: Access Control Concepts

Which access control model grants permissions based on a user's job function or role within an organization?

Question 25 - Domain: Access Control Concepts

The principle of **Least Privilege** dictates that:

Question 26 - Domain: Access Control Concepts

Which principle helps prevent fraud and errors by dividing critical tasks among different individuals?

Question 27 - Domain: Access Control Concepts

Which authentication factor includes biometric data like fingerprints or facial recognition?

Question 28 - Domain: Access Control Concepts

Which access control model determines access based on a set of attributes related to the user, resource, action, and environment?

Question 29 - Domain: Access Control Concepts

A security policy states that a user must use a password (something they know) and a security token (something they have) to access sensitive data. This is an example of implementing:

Question 30 - Domain: Access Control Concepts

The **Mandatory Access Control (MAC)** model is primarily used in environments that require:

Question 31 - Domain: Network Security

Which security device acts as a "gateway guard" that filters network traffic based on predefined rules?

Question 32 - Domain: Network Security

What is the purpose of a **Demilitarized Zone (DMZ)** in a network architecture?

Question 33 - Domain: Network Security

Which of the following is a security benefit of using **VLANs**?

Question 34 - Domain: Network Security

A **Host-based Intrusion Detection System (HIDS)** primarily monitors:

Question 35 - Domain: Network Security

Which protocol is crucial for synchronizing the time across devices on a network, which is vital for accurate security logging?

Question 36 - Domain: Network Security

The OSI (Open Systems Interconnection) model consists of how many layers?

Question 37 - Domain: Network Security

Which system monitors network traffic and actively blocks detected attacks, rather than just alerting?

Question 38 - Domain: Network Security

**HTTPS** primarily provides security by:

Question 39 - Domain: Network Security

An organization separates its guest Wi-Fi traffic from employee network traffic using a logical segmentation method. This is an example of implementing:

Question 40 - Domain: Network Security

Which of the following describes the function of an **Intrusion Detection System (IDS)**?

Question 41 - Domain: Security Operations

Which security tool is designed to detect, prevent, and remove malicious software like viruses and ransomware from individual devices?

Question 42 - Domain: Security Operations

The primary function of **Data Loss Prevention (DLP)** systems is to:

Question 43 - Domain: Security Operations

The process of regularly updating systems and software to fix known security vulnerabilities is known as:

Question 44 - Domain: Security Operations

A centralized tool that collects and analyzes security logs from multiple sources to help detect and respond to threats is known as:

Question 45 - Domain: Security Operations

Which security operation focuses on educating employees about security best practices and common threats like phishing?

Question 46 - Domain: Security Operations

A company implements a policy that outlines acceptable and unacceptable behaviors for using its IT systems and resources. This document is known as:

Question 47 - Domain: Security Operations

The main purpose of **Change Management** is to:

Question 48 - Domain: Security Operations

When implementing **Patch Management**, what important consideration should always be made to mitigate unforeseen issues?

Question 49 - Domain: Security Operations

**Logging and Monitoring** operations are essential for security because:

Question 50 - Domain: Security Operations

Why is the human element often considered the weakest link in the security chain?