ISC2 Certified in Cybersecurity (CC) Practice Test
Use the form below to configure your ISC2 Certified in Cybersecurity (CC) Practice Test. The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

ISC2 Certified in Cybersecurity (CC) Information
Overview of the ISC2 Certified in Cybersecurity (CC) Exam
The ISC2 Certified in Cybersecurity (CC) certification is an entry-level credential designed for individuals looking to establish careers in cybersecurity. It is ideal for beginners or those transitioning into the field with little to no prior experience. The CC exam assesses fundamental knowledge in areas such as network security, risk management, access control, and incident response. As cybersecurity threats continue to rise, earning this certification demonstrates your understanding of essential concepts and your commitment to protecting digital systems.
The ISC2 CC exam includes multiple-choice and multiple-response questions, focusing on foundational security principles. Passing the exam requires a thorough understanding of core cybersecurity concepts. It is widely recognized as a stepping stone toward more advanced certifications, such as the CISSP. Candidates who earn this certification gain a strong foundation that can lead to entry-level positions, further specialized training, and career advancement within the cybersecurity field.
Why Taking Practice Exams is Crucial
Preparing for the ISC2 CC exam requires dedication and a focused study plan. One of the most effective methods to prepare is taking practice exams. These not only test your knowledge but also familiarize you with the format and style of actual exam questions. Understanding how questions are phrased and learning to identify the best answers helps reduce anxiety and build confidence for exam day.
Practice exams highlight your strengths and expose areas where you may need more study, allowing you to focus on those topics and improve your understanding. They simulate the exam experience under timed conditions, helping you better manage time and increase accuracy during the real test. Regularly working through practice exams makes it easier to retain knowledge and apply it effectively. Integrating practice exams into your study plan is a critical step toward successfully earning the ISC2 CC certification.
Tips for Success on the ISC2 CC Exam
Efficient preparation for the ISC2 CC exam starts with understanding the exam objectives and gathering study materials that cover all topics comprehensively. Study guides, flashcards, and online courses tailored to the CC syllabus are excellent tools to reinforce your knowledge. Make sure to allocate time each day for consistent study, breaking down topics into manageable sections.
In addition to studying, practicing hands-on exercises and scenarios can help improve your comprehension of real-world security situations. Combine this with regular practice exams to fine-tune your testing strategies. Staying consistent and focused throughout your preparation will increase your chances of passing the ISC2 CC exam and earning the certification.

Free ISC2 Certified in Cybersecurity (CC) Practice Test
- 20 Questions
- Unlimited time
- Security PrinciplesBusiness Continuity, Disaster Recovery & Incident Response ConceptsAccess Control ConceptsNetwork SecuritySecurity Operations
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
Which action best demonstrates the principle of least privilege in practice within an organization today?
Letting a project manager have unrestricted access to all corporate file shares in case information is needed
Allowing every developer full administrator rights on production servers to simplify deployments
Giving a financial analyst read-only access to the report server needed to review quarterly numbers
Providing temporary staff the same network privileges as permanent employees for convenience
Answer Description
The principle of least privilege requires that users receive only the minimum permissions necessary to perform their job duties. Granting a financial analyst read-only access to the report server limits the analyst to viewing data, preventing unintended or malicious changes while still allowing the analyst to do their work. Each incorrect choice provides broader permissions than needed: giving developers full administrator rights, equating temporary staff privileges with permanent employees, or granting a project manager unrestricted access to all file shares all violate least-privilege by exceeding the minimum required access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the principle of least privilege?
How can organizations effectively implement the principle of least privilege?
What are the risks of not following the principle of least privilege?
What is the standard format and size of an Internet Protocol version 4 (IPv4) address used on most networks?
A 128-bit address shown as eight groups of four hexadecimal digits separated by colons.
A 32-bit address divided into four 8-bit octets displayed in dotted-decimal form (e.g., 192.168.0.1).
A 64-bit address written entirely in binary with periods after every eight bits.
A 48-bit address expressed as twelve hexadecimal digits separated by colons.
Answer Description
An IPv4 address consists of 32 bits broken into four 8-bit segments (octets). Each octet is converted to decimal and the four values are written in dotted-decimal notation (for example, 192.168.1.1). The other choices are incorrect because 48-bit addresses describe MAC addresses, 64-bit binary strings are not used for IP addressing, and 128-bit hexadecimal groups separated by colons describe IPv6, not IPv4.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between IPv4 and IPv6?
Why are IPv4 addresses written in dotted-decimal notation?
How does an IPv4 address identify devices on a network?
Under the standard classification of security controls, which of the following is an example of a physical control rather than an administrative or technical control?
Posting a security guard at the data-center entrance
Requiring full-disk encryption on all company laptops
Implementing multi-factor authentication with one-time passcodes
Conducting quarterly reviews of user access privileges
Answer Description
A security guard physically restricts or permits entry to a facility, making the control tangible and location-based; therefore it is categorized as a physical control. Encryption of laptops is a technical control because it relies on software and algorithms. Reviewing user privileges is an administrative control involving policy and oversight. Multi-factor authentication with one-time passcodes is also a technical control that uses electronic mechanisms to verify identity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a physical security control?
How do physical controls differ from administrative and technical controls?
Why is a security guard considered a physical control instead of a technical or administrative one?
Which mechanism primarily provides non-repudiation for an email message by confirming both the sender's identity and the message's integrity?
Digital signature
Checksum generated from the message's contents
Adding a time stamp to the email header
Encrypting the email with a shared symmetric key
Answer Description
Non-repudiation demands proof that a specific sender created an unchanged message. A digital signature accomplishes this by combining the sender's private key with a hash of the email; successful verification with the corresponding public key shows the content is intact and that only the sender could have produced the signature. A checksum or hash alone proves integrity but not authorship, symmetric encryption relies on a shared secret so either party could have created the ciphertext, and a time stamp merely records when the message was handled without linking it to a unique signer or protecting the content.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a digital signature ensure non-repudiation?
What is the difference between a digital signature and a checksum?
Why is symmetric encryption not suitable for non-repudiation?
Within information assurance, which one of the following statements most accurately defines the principle of privacy?
Confirming the claimed identity of a user, device, or process before granting access.
Protecting an individual's personal or sensitive information from unauthorized use or disclosure.
Making sure that authorized users can access required information and resources when needed.
Ensuring that data remains accurate, complete, and unaltered during storage or transmission.
Answer Description
Privacy is concerned with safeguarding information that can identify an individual (sometimes called personally identifiable information, or PII) so that it is not used or disclosed without proper authorization. While confidentiality, integrity, availability, and authentication are also core security concepts, they address different goals: confidentiality protects any sensitive data from unauthorized access; integrity focuses on preventing unauthorized alteration of information; availability ensures timely, reliable access for authorized users; and authentication verifies identity. Therefore, the statement describing protection of personal or sensitive information from unauthorized use or disclosure correctly captures the essence of the privacy principle.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Personally Identifiable Information (PII)?
How is privacy different from confidentiality in cybersecurity?
What methods can be used to protect sensitive information from unauthorized disclosure?
Requiring all company laptops to use full-disk encryption with AES-256 would most appropriately be documented in which governance element?
Procedure
Standard
Regulation
Policy
Answer Description
A standard is a mandatory, technology-specific requirement that supports a higher-level policy. Stating that all laptops must use full-disk encryption with a particular algorithm specifies an exact configuration, so it belongs in a standard. A policy would only express management's intent to protect mobile devices without detailing encryption choices. A procedure would describe the step-by-step process technicians follow to enable encryption. A regulation is an external legal mandate, not an internal governance document.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a standard and a policy?
What makes AES-256 suitable for full-disk encryption?
How does a procedure differ from a standard in the context of governance?
During risk treatment, which strategy involves selecting safeguards to lessen either the likelihood or impact of a threat without eliminating the activity that creates the risk?
Acceptance
Avoidance
Transference
Mitigation
Answer Description
The strategy described is mitigation. When an organization mitigates a risk, it implements controls-such as technical safeguards, administrative policies, or physical protections-to reduce the probability that the threat will be realized, the damage it can cause, or both. Mitigation keeps the activity in place but attempts to make it safer.
Avoidance takes the opposite approach by stopping or never starting the risky activity, thereby removing the exposure altogether. Transference shifts the financial responsibility for loss to another party (for example, through insurance or outsourcing). Acceptance means the organization consciously decides to tolerate the risk without further action, usually because the cost of additional controls would exceed the expected loss. Because only mitigation focuses on reducing likelihood or impact while allowing the activity to continue, it is the correct answer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of mitigation strategies in cybersecurity?
How does mitigation differ from avoidance in risk treatment?
When might an organization choose risk acceptance over mitigation?
When an organization buys cyber-insurance so that any financial loss from a data breach is covered by the insurer, which risk treatment strategy is it applying?
Acceptance (risk retention)
Avoidance
Transference (risk sharing)
Mitigation (risk reduction)
Answer Description
Purchasing insurance shifts the potential financial consequences of a security incident to a third party. This action exemplifies the risk transference (or sharing) strategy, where the organization pays another entity to assume part or all of the impact. Mitigation focuses on reducing likelihood or impact through controls, acceptance involves doing nothing beyond acknowledging the risk, and avoidance eliminates the risky activity altogether.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is buying cyber-insurance considered transference?
How does transference differ from mitigation?
What are some real-world examples of risk transference strategies?
In which scenario is a certified cybersecurity professional most directly upholding the first ISC2 Code of Ethics canon to protect society, the common good, public trust, and critical infrastructure?
Disabling internet access to employee laptops to stop non-work browsing.
Implementing redundant firewalls and backup links for a city's emergency dispatch network to ensure continuous availability.
Publicly posting exploit code for an unpatched flaw to pressure the vendor.
Negotiating a higher salary after obtaining certification.
Answer Description
The first canon obligates professionals to place the welfare of society and the resilience of vital systems above all other considerations. By implementing redundant firewalls and backup network links for a city's emergency dispatch service, the professional is actively safeguarding critical infrastructure and helping to ensure that life-safety services remain available to the public. Disabling employee internet access may reduce risk but does not directly advance public trust or protect essential services. Negotiating a higher salary addresses personal interest, not societal welfare. Publishing exploit code for an unpatched vulnerability can endanger the public by facilitating attacks rather than protecting them.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are redundant firewalls, and how do they enhance security?
Why is the availability of emergency dispatch services critical to public safety?
What does the ISC2 Code of Ethics' first canon mean in practice?
Within the OSI model, which layer is responsible for delivering services like HTTP, FTP, and SMTP to user processes, effectively serving as the interface between application software and the network?
Application layer
Presentation layer
Session layer
Transport layer
Answer Description
The Application layer (Layer 7) is the top layer of the OSI model. It provides network-related services directly to user applications, enabling functions such as web browsing (HTTP), email transmission (SMTP), and file transfers (FTP). It supplies the protocols and interfaces that allow software to access network resources. The Presentation layer focuses on data formatting and encryption, the Session layer manages dialog control between hosts, and the Transport layer is concerned with reliable data delivery and flow control, not end-user application services.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the OSI model?
How does the Application layer interact with the other OSI layers?
What are examples of protocols used in the Application layer?
Which business motivation is widely recognized as a key driver for creating an organization's disaster recovery plan?
Complying with legal or industry regulations that mandate data protection and service availability
Lowering ongoing software licensing expenses through system consolidation
Eliminating the need for periodic hardware refresh projects
Increasing employee engagement by adding gamified cybersecurity training
Answer Description
Disaster recovery planning is not only about technology-it is often mandated by laws and industry regulations that require organizations to protect data and ensure service continuity. Meeting these legal or regulatory obligations is therefore a primary driver for establishing a formal disaster recovery capability. Cost-saving measures, employee engagement programs, or avoiding routine hardware upgrades may provide ancillary benefits, but they are not central reasons why most organizations invest in disaster recovery planning.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a disaster recovery plan?
Why are legal or industry regulations important for disaster recovery planning?
How is disaster recovery planning different from business continuity planning?
During risk treatment, which strategy is characterized by deploying security controls to reduce the probability or potential damage of an identified risk to an acceptable level?
Acceptance
Avoidance
Transference
Mitigation
Answer Description
The strategy described is mitigation, also known as risk modification. Mitigation involves adding or enhancing safeguards-such as encryption, access controls, or redundancy-to lower either the likelihood that a threat succeeds or the magnitude of its impact. Transference shifts the risk to a third party (for example, through insurance), acceptance means consciously deciding to take no further action, and avoidance eliminates the risky activity altogether. Only mitigation focuses on reducing likelihood or impact through controls.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of security controls used for risk mitigation?
How does mitigation differ from risk avoidance?
When should risk transference be chosen over mitigation?
According to the ISC2 Code of Ethics, which canon specifically obligates members to carry out work for their employers or clients with diligence and competence?
Act honorably, honestly, justly, responsibly, and legally.
Advance and protect the profession.
Provide diligent and competent service to principals.
Protect society, the common good, necessary public trust and confidence, and the infrastructure.
Answer Description
The canon that stresses the need to perform professional duties skillfully and attentively in service to employers or clients is "Provide diligent and competent service to principals." The other canons focus on broader societal protection, personal integrity, or advancing the profession, rather than directly requiring competent service to those who employ or retain the professional.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'diligent and competent service' mean in the context of the ISC2 Code of Ethics?
How does the 'diligent and competent service' canon differ from the 'protect society' canon?
Why is 'diligent and competent service' vital to cybersecurity professionals?
Which of the following authentication credentials best exemplifies the "something you are" factor used in the three common authentication factors?
Six-digit PIN
Iris scan pattern
Security smart card
One-time password sent via SMS
Answer Description
The "something you are" factor relies on inherent physical characteristics of the user. An iris scan pattern is a biometric measurement that uniquely identifies an individual, therefore satisfying the inherence factor. A smart card represents "something you have" because it is a physical object in the user's possession. A six-digit PIN is "something you know" because it is memorized information, and an SMS one-time password is also "something you have" because it depends on possession of the registered mobile device. Only the biometric iris scan directly reflects the user's own physical trait.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the three common authentication factors?
How does an iris scan work in authentication?
Why isn't an SMS one-time password considered 'something you are'?
In an information security governance framework, which document type is both legally binding and issued by a governmental authority that an organization must obey?
Internal procedure
Industry standard
Organizational policy
Government regulation or law
Answer Description
Regulations and laws originate from governmental bodies (e.g., legislatures or regulatory agencies) and carry the force of law, making compliance mandatory. Policies, procedures, and industry standards are developed internally or by non-government groups; although they may be required by management or contracts, they do not have the same legal authority or enforcement mechanisms as a government regulation or law.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a regulation and a policy?
Why are regulations and laws important in cybersecurity?
How do industry standards differ from government regulations?
Which of the following best exemplifies an administrative control put in place to influence employee security behavior within an organization?
Implementing RAID 5 to protect against disk failure
Providing mandatory security awareness training to all staff
Configuring packet-filter rules on the network firewall
Installing biometric scanners on the data-center doors
Answer Description
Administrative controls are policy-driven or managerial measures that direct how people must act. Security awareness training is created and mandated by management to educate workers and shape acceptable behavior, so it is an administrative control. Firewall rule sets and RAID disk arrays are technical safeguards, while biometric door locks are physical controls; none of these are categorized as administrative.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are administrative controls in cybersecurity?
Why is security awareness training considered an administrative control?
How do administrative controls differ from technical and physical controls?
When a company uses RFID badge readers on office doors, what specific security feature do these badge systems most commonly provide as part of physical access control?
Detecting motion inside restricted rooms using infrared sensors
Encrypting data on network file shares based on user roles
Recording who entered and exited an area, along with the time of access
Performing biometric fingerprint scans before door unlock
Answer Description
Electronic badge systems authenticate a person by reading data stored on a card's magnetic stripe or RFID chip and then record the time and location of the successful (or failed) entry attempt. This audit trail supports accountability and investigations. Cameras, motion detectors, and fire-suppression equipment are separate controls, while logical file permissions are handled by software-based access control, not physical badge readers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is RFID and how does it work in access control?
Why is an audit trail important in physical access control systems?
How does RFID authentication differ from biometric systems in physical access control?
According to ISC2 requirements, what is the primary condition related to the Code of Ethics that every certification holder must satisfy to remain in good standing?
They must submit an annual signed statement from their employer confirming ethical behavior.
They must attend mandatory ethics training every five years.
They must publish a personal ethics policy on a publicly accessible website.
They must acknowledge and consistently abide by the Code of Ethics.
Answer Description
ISC2 makes adherence to its Code of Ethics a continuing, mandatory obligation for all members and associates. Certification holders must explicitly commit to follow the four canons and conduct themselves accordingly; failure to do so can lead to disciplinary action or loss of certification. Neither recurring seminars, employer attestations, nor public postings are stipulated by ISC2 as standing requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the four canons in the ISC2 Code of Ethics?
What happens if an ISC2 member violates the Code of Ethics?
Why is adherence to a Code of Ethics important in cybersecurity?
An organization wants to implement a security measure that automatically filters malicious network packets before they reach internal hosts. Which of the following is an example of the appropriate technical control?
Publish an acceptable use policy for all staff.
Mount CCTV cameras to monitor building entrances.
Provide mandatory security awareness training sessions.
Configure a network firewall to block unwanted traffic.
Answer Description
Technical controls are safeguards implemented through hardware, software, or firmware. A network firewall that inspects and filters packets is a classic technical control because it is a software or hardware device that directly enforces security on data in transit. Security awareness training and acceptable use policies are administrative controls, while closed-circuit video cameras are physical controls. Although each plays an important role, only the firewall fits the definition of a technical control designed to protect systems electronically.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a network firewall and how does it work?
What is the difference between technical, administrative, and physical controls?
How does packet filtering work in firewalls?
What is the primary purpose of an incident response plan within an organization's cybersecurity program?
To meet legal requirements for data retention and privacy.
To provide alternate facilities to continue operations during disasters.
To identify and patch vulnerabilities during software development.
To limit damage and shorten recovery time after a security incident.
Answer Description
An incident response (IR) plan exists to guide coordinated actions that immediately address a security event. Its chief aim is to minimize the damage an incident causes-such as data loss, service disruption, and reputational harm-and to speed restoration of normal operations. While vulnerability management, regulatory compliance, and alternate facility planning are important security or continuity activities, they are handled by separate processes (secure development, governance/risk/compliance, and disaster recovery/business continuity respectively).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key components of an incident response plan?
How does an incident response plan differ from a disaster recovery plan?
Why is effective communication critical during incident response?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.