Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CC Exam Dumps - ISC certification Questions and Answers

Question # 44

Which one of the following cryptographic algorithms does NOT depend upon the prime factorization problem?

Options:

A.

RSA – Rivest-Shamir-Adleman

B.

GPG – GNU Privacy Guard

C.

ECC – Elliptic Curve Cryptosystem

D.

PGP – Pretty Good Privacy

Buy Now
Question # 45

A DDoS attack flooding ICMP packets is called:

Options:

A.

DoS

B.

SYN flood

C.

Smurf attack

D.

Phishing

Buy Now
Question # 46

What does Personally Identifiable Information (PII) pertain to?

Options:

A.

Information about an individual's health status

B.

Data about an individual that could be used to identify them

C.

Trade secrets, research, business plans, and intellectual property

D.

The importance assigned to information by its owner

Buy Now
Question # 47

Which activity is often associated with Disaster Recovery efforts?

Options:

A.

Running anti-malware

B.

Vulnerability scanning

C.

Zero-day exploits

D.

Employees returning to the primary production location

Buy Now
Question # 48

The magnitude of harm expected from unauthorized disclosure, modification, destruction, or loss of information is known as:

Options:

A.

Threat

B.

Vulnerability

C.

Impact

D.

Likelihood

Buy Now
Question # 49

Which type of attack takes advantage of vulnerabilities in validation?

Options:

A.

ARP spoofing

B.

Pharming attacks

C.

Cross-site scripting (XSS)

D.

DNS poisoning

Buy Now
Question # 50

A curated knowledge base modeling adversary behavior across attack phases is:

Options:

A.

MITRE ATTandCK

B.

CVE

C.

RMF

D.

Security Management

Buy Now
Question # 51

Which addresses are reserved for internal network use and are not routable on the Internet?

Options:

A.

ac00:: to adff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

B.

fc00:: to fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

C.

bc00:: to bdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

D.

cc00:: to cdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff

Buy Now
Question # 52

Which prevents threats?

Options:

A.

Antivirus

B.

IDS

C.

SIEM

D.

HIDS

Buy Now
Question # 53

DNS operates at which OSI layer?

Options:

A.

Physical

B.

Network

C.

Application

D.

Data Link

Buy Now
Exam Code: CC
Exam Name: CC - Certified in Cybersecurity
Last Update: Feb 24, 2026
Questions: 403
CC pdf

CC PDF

$25.5  $84.99
CC Engine

CC Testing Engine

$28.5  $94.99
CC PDF + Engine

CC PDF + Testing Engine

$40.5  $134.99