Skip survey header

ISC2 Certified in Cybersecurity: CC Quiz 1

Enjoy the following 10 question quiz from TestOut.

1. You are assisting your organization in implementing new firewall rules. What type of control are you implementing? *This question is required.
2. You become aware that one of your colleagues provided a CC candidate with the text of several questions that appeared on their certification exam. What canon of the ISC2 code of ethics was most directly violated? *This question is required.
3. Your organization recently experienced a disaster that activated their disaster recovery program. At what point is the effort considered concluded? *This question is required.

4. Your organization recently experienced a security incident where the attacker was able to take down your primary website. What cybersecurity principle does this attack most directly violate?

*This question is required.
5. You are building a new file system where each department’s managers can control access to files stored on their portion of the server, granting it to anyone they choose. What access control model best describes this approach? *This question is required.
6. Which one of the following is NOT a standard part of the crime prevention through environmental design (CP TED) philosophy? *This question is required.
7. You are setting up a new wireless network and would like to configure it to require that people accept terms and conditions before using the network. The network will be used by many thousands of guests each day.

What access control mechanism would be most efficient?
*This question is required.
8. You are installing a public-facing web server for your organization. What network zone would be the most appropriate for this device? *This question is required.
9. You are using public key encryption to send and receive messages with your supervisor. You would like to decrypt a message that your supervisor sent you. What key should you use? *This question is required.
10. You are designing a new policy for your organization that will allow employees to access corporate email on their personal devices. What term best describes this policy? *This question is required.
This free quiz was provided by: