ISC2 Practice Questions
ISC2 Practice Questions
25 Free
Questions On
Certified In
Cybersecurity
Certification
Cybersecurity / By Senthil
Table of Contents
1. Exam Format for Certified in
Cybersecurity Certification
Exam
2. Top 25 Certified in
Cybersecurity Certification Free
Questions
3. Domain: Network Security
4. Domain: Network Security
5. Domain: Network Security
6. Domain: Network Security
7. Domain: Network Security
8. Domain: Network Security
9. Domain: Network Security
10. Domain: Network Security
11. Domain: Security Operations
12. Domain: Network Security
13. Domain: Network Security
14. Domain: Network Security
15. Domain: Network Security
16. Domain: Network Security
17. Domain: Network Security
18. Domain: Network Security
19. Domain: Network Security
20. Domain: Network Security
21. Domain: Network Security
22. Domain: Network Security
23. Domain: Network Security
24. Domain: Network Security
25. Domain: Network Security
26. Conclusion
Domain: Network
Security
Question 1: Which one is the most
common security threat with IoT
devices?
A. Logical Network Segmentation
B. Lack of device management
C. Lack of system update against a
new vulnerability
D. Backdoor
Correct Answer: C
Explanation:
Reference:
Correct Answer: B
Explanation:
Deployment of network-based
micro-segmentation is not very
granular because it is extremely
difficult to map business
segmentation needs to networking
constructs.
Reference:
Domain: Network
Security
Question 3: Which type of security
control micro-segmentation
supports?
A. Logical rules
B. Physical rules
C. Logical and physical rules
D. Network-defined rules
Correct Answer: A
Explanation:
These are logical rules, not physical
rules, and do not require additional
hardware or manual interaction
with the device (that is, the
administrator can apply the rules to
various machines without having to
physically touch each device or the
cables connecting it to the
networked environment).
Reference:
Domain: Network
Security
Question 4: Which of the below
methods is best for hosting
streaming video files for the
company’s remote users where we
can ensure that the data is protected
while it’s streaming?
A. Symmetric encryption
B. Hashing
C. Asymmetric encryption
D. VLANs
Correct Answer: A
Explanation:
Reference:
Domain: Network
Security
Question 5: Which of the below
technologies does not guarantee a
network’s security?
A. VLAN
B. Firewall
C. IDS/IPS
D. VPN
Correct Answer: A
Explanation:
Reference:
Domain: Network
Security
Question 6: Which of the below VLAN
configurations could be a threat to
network security?
Correct Answer: C
Explanation:
Main purpose of using VLANs is
micro segmentation. If two VLANs
are talking to each other then
segmentation is not there and if one
vlan is hacked by an external
hacker, he would be able to get
access to the entire network.
Reference:
Domain: Network
Security
Question 7: Which of the below
technologies/protocols does not
necessarily provide encryption?
A. SSH
B. TLS
C. SSL
D. VPN
Correct Answer: D
Explanation:
Reference:
A. Firewall
B. VLAN
C. IDS
D. Switch
Correct Answer: B
Explanation:
In large corporate networks, VLANs
can be used to limit the amount of
broadcast traffic within a network.
This is most common in networks of
more than 1,000 devices and may
be separated by department,
location/building, or any other
criteria as needed.
Reference:
Domain: Network
Security
Question 9: While securing data from
the public, an organization employs
two-factor authentication (2FA), role-
based access control, tokenization,
and air-gapped networks. Which
concept of cyber security is being
applied here by this organization?
A. Defense in depth
B. Data security
C. Logical access control
D. Security through obscurity
Correct Answer: A
Explanation:
Reference:
Domain: Security
Operations
Question 10: What is the right time to
plan for security?
A. Pre-deployment
B. Post-deployment
C. Testing Phase
D. Monitoring Phase
Correct Answer: A
Reference:
ISC2 Self-Paced Course – Chapter
5-Module 1: Understand Network
(Cyber) Threats and Attacks
Domain: Network
Security
Question 11: To ensure the availability
of a data center, it is best to plan for
both resilience and ___________ of
the elements in the facility.
A. Uniqueness
B. Security
C. Redundancy
D. Incident response
Correct Answer: C
Explanation:
Availability is guaranteed by
ensuring that elements of the data
center are replicated in case any
given individual element fails.
Reference:
A. Four
B. Three
C. Two
D. One
Correct Answer: B
Explanation:
It is recommended that a rack
have three temperature sensors,
positioned at the top, middle and
bottom of the rack, to measure the
actual operating temperature of the
environment.
Reference:
ISC2 Self-Paced Course – Chapter
4-Module 3: Understand Network
Security Infrastructure
Domain: Network
Security
Question 13: To prevent fire mashups
in the data center, fire suppression
systems are required. Which of the
below fire suppression technique is
best for the data center?
A. Sprinkler System
B. Dry Water Pipes
C. Overhead Water Tank
D. Fire extinguisher
Correct Answer: B
Explanation:
Reference:
https://resources.impactfireservices
.com/which-fire-protection-
system-is-best-for-server-rooms-
and-data-centers
Domain: Network
Security
Question 14: When choosing a cable
type for a data center, one should
look for the lowest attenuation. Which
of the below cable types have the
highest attenuation?
A. Glass Cable
B. Optical Fiber
C. Copper Wires
D. Twisted Cables
Correct Answer: C
Explanation:
Reference:
Domain: Network
Security
Question 15: When choosing a cable
type for a data center, someone
should look for the lowest
attenuation. Which of the below cable
type is best for the data center where
the signal needs to travel from one
rack to far located last rack?
A. Glass Cable
B. Optical Fiber
C. Copper Wires
D. Twisted Cables
Correct Answer: A
Explanation:
Reference:
Domain: Network
Security
Question 16: Which of the below
agreements needs to be signed to
establish a common legal term that
establishes a “conditional
agreement” between client and
Vendor?
A. MOU
B. MOA
C. NDA
D. SLA
Correct Answer: B
Explanation:
A memorandum of agreement
(MOA) or cooperative is a
document written between parties
saying the client & vendor to work
together on an agreed-upon
project or meet an agreed-upon
objective. It is a written
understanding of the agreement
between two or more parties. The
MOA can also be a legal document
that holds the parties responsible
for their commitment to work.
Reference:
ISC2 Self-Paced Course – Chapter
4-Module 3: Understand Network
Security Infrastructure
Domain: Network
Security
Question 17: Tracy, an owner of a
Tech startup has outsourced his infra
management to an MSP (Managed
Service Provider) Company. Which
document needs to be signed by a
Managed Service provider to protect
the Client’s confidential agreement?
A. NDA
B. SLA
C. MOA
D. MOU
Correct Answer: A
Explanation:
An NDA (non-disclosure
agreement) is a legally binding
agreement between a client and
vendor that says both parties
cannot share confidential
information with the public.
Reference:
A. HVAC
B. UPS
C. Utility
D. Generator
Correct Answer: A
Explanation:
Domain: Network
Security
Question 19: Being a CSC (cloud
service customer) Jhulan opted for a
bunch of server instances and
configured them to run her own
software. Is this an example of a
cloud deployment model?
A. SecaaS
B. PaaS
C. SaaS
D. IaaS
Correct Answer: D
Explanation:
Domain: Network
Security
Question 20: As per NIST SP 800-145
which one is not the cloud
characteristics?
A. Ubiquitous
B. Convenient
C. On-demand
D. Dedicated resource pool
Correct Answer: D
Explanation:
Reference:
Domain: Network
Security
Question 21: Which of the below
features provides redundancy in the
cloud model?
Correct Answer: C
Explanation:
Reference:
Domain: Network
Security
Question 22: Which of the below can
be a disadvantage to working with an
MCSP (managed cloud service
provider)?
A. Optimization
B. Migration
C. Infrastructure Management
D. Security & Transparency
Correct Answer: D
Explanation:
Reference:
Domain: Network
Security
Question 23: Which one of the below
terms & conditions mentioned in an
SLA is not related to cloud security?
A. Data Location
B. Data Access
C. Data Portability
D. Change Management Process
Correct Answer: C
Explanation:
Reference:
ISC2 Self-Paced Course – Chapter
4-Module-3- Understand Network
Security Infrastructure
Correct Answer: A
Explanation:
Reference:
Domain: Network
Security
Question 25: Which one of the below
is the right statement about defense
in depth?
Defense in depth uses a layered
approach when designing the
security posture of an organization
Correct Answer: A
Explanation:
Reference:
About Senthil
Senthil Kumar is a
Data Research
and Analytics Lead with over
6+ years of experience in the
field. He is a highly skilled
data analyst, able to use his
analytical abilities to turn
business objectives into
actionable insights.With
strong planning and
organizational skills, and an
unwavering focus on the
customer, Senthil is able to
deliver successful projects
that align with the
organization's objectives. He
is able to think both laterally
and pragmatically, which
enables him to come up with
innovative solutions that drive
the organization's success.
← Previous Post Next Post →
Related Posts
Type here..
Na Em Post Comment »
Newsletter
Email *
Subscribe
Currently Trending:
15 Best Free Cloud Storage in 2024 –
Up to 200…
Categories
Agile and Scrum (53)
BigQuery (1)
Blockchain (9)
Business (3)
Career (3)
Comptia (10)
Cybersecurity (27)
Databricks (10)
Deals (1)
DevOps (121)
Featured (13)
Hashicorp (3)
Java (115)
Kuberenetes (12)
Linux (23)
Networking (3)
Nginx (1)
Nvidia (2)
Salesforce (3)
Sandbox (1)
Webinar (21)
Company
About Us | Reviews | Careers | Become an Affiliate
| Become Our Instructor | Team Account | AWS
Consulting Services
Legal
Privacy Policy | Terms of Use | EULA | Refund Policy
| Programs Guarantee
Support
Contact Us | Discussions | FAQs
© 2024 | Whizlabs
Software Pvt. Ltd. All
rights reserved.