ISC2 CC Sample Questions : Unofficial

Поділитися
Вставка
  • Опубліковано 2 чер 2024
  • (ISC)² Certified in Cybersecurity is a foundational cybersecurity certification designed to help recipients build a pathway to a rewarding career in cybersecurity.
    If you're interested in becoming part of a dynamic and fulfilling workforce, consider obtaining a Cybersecurity Certification. This credential showcases your fundamental knowledge and enthusiasm for becoming a valued member of an employer's team.
    This certification is particularly beneficial for:
    - IT experts
    - Individuals seeking a career switch into cybersecurity
    - University students or recent graduates
    - People who want to be certified in (ISC)² Cybersecurity
    Domains that (ISC)² CC exam covers:
    DOMAIN 1 - Security Principles
    DOMAIN 2 - Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
    DOMAIN 3 - Access Control Concepts
    DOMAIN 4 - Network Security
    DOMAIN 5 - Security Operations
    #Cybersecurity
    #isc2
    #ISC²
    #isc2dumps
    #isc2024
    #cybersecuritycertification
    #cisspexam
    #cissp
    #informationsecurity
    #networksecurity
    isc2 cc exam questions
    isc2 certified cybersecurity
    isc2 cc
    isc2
    isc2 cc exam preparation
    isc2 cybersecurity certification
    isc2 cc exam
    isc2 certified in cybersecurity
    isc2 certified cybersecurity exam
    isc2 cc exam dumps
    isc2 cc course
    isc2 free certification
    isc2 certification
    how to pass isc2 cc exam
    isc2 cc certificate
    isc2 cybersecurity exam
    isc2 cc Practice Questions
    isc2 cc Practice Tests
    isc2 certified in cybersecurity Practice Questions
    isc2 certified in cybersecurity Practice Tests
    isc2 cc exam simulations
    isc2 cc exam simulation
    isc2 cc exam simulator
    isc2 certified in cybersecurity Practice Questions
    isc2 certified in cybersecurity simulation
    cybersecurity podcast
    isc2 cc exam mock up
    isc2 cc exam mock ups
    isc2 certified in cybersecurity simulations
    isc2 certified in cybersecurity simulator
    america cybersecurity questions
    australia cybersecurity questions
    canada cybersecurity questions
    New Zealand cybersecurity questions
    how to pass isc2 cc
    how to pass isc2 cc exam
    how to pass isc2 certified in cybersecurity exam
    isc2 entry level cyber security
    isc2 cc exam topic
    isc2 cc mock exams
    isc2 dump
    cyber security certifications
    certified in cybersecurity exam
    certified in cybersecurity isc2
    cc exam isc2
    cc isc2
    isc2 cc exam voucher
    cybersecurity for beginners
    isc2 cc questions and answers
    isc2 certified in cybersecurity questions and answers
    cyber security dumps
    isc2 cc dumps
    isc2 certified in cybersecurity exam dumps
    isc2 certified in cybersecurity mock exams
    isc2 certified in cybersecurity exam mock up
    isc2 certified in cybersecurity exam mock ups

КОМЕНТАРІ • 33

  • @meritelebor877
    @meritelebor877 6 місяців тому +3

    Thank you for this video. I am grateful I get to see this video before my exam scheduled in a few weeks.
    Wish me the best guys.😊😊

    • @CertificationTerminal
      @CertificationTerminal  6 місяців тому

      Pleasure is ours. We wish you all the best for your exam and 'l be eagerly waiting for the result.

  • @gemuhhans2262
    @gemuhhans2262 День тому

    What is then the difference between authentication and authorisation

  • @aka1Khalid
    @aka1Khalid 6 місяців тому +3

    I heard the actual certification exam is much different and much harder than the exams they give you in the online course. Are the questions in your video related to the actual certification exams? My exam is booked next week so I've been trying to gain a much better understanding of the course material as they don't tell you a lot in the course compared with what they actually put in the certification exam.
    Thanks so much for taking the time to put these videos up. Everyone here appreciates them even if they didn't say it.

    • @CertificationTerminal
      @CertificationTerminal  6 місяців тому +2

      Thank you very much for your generous feedback. We take great joy in offering insights into the exam. While the actual exam might present slight differences in the questions from what we've covered here, we urge you not to worry about the course material. Instead, focus on thoroughly understanding each question and its accurate solution, delving into the reasons why the other choices are incorrect, as elaborated in our video series.
      Moreover, we'd be immensely grateful if you could share these videos with friends and family who could benefit from them.
      - Certification Terminal team

  • @joewellosobni943
    @joewellosobni943 6 місяців тому +3

    Q7 is wrong - authentication is no authorization - authorization is granting permissions for authenticated person. Authenticating is process of verifying the identity of an entity, such as a user, device, or service - part of it is identification.

    • @CertificationTerminal
      @CertificationTerminal  6 місяців тому

      Yes, you are 100% correct. Authentication is the process of validating the claimed identity and Authorization granting access on the resource (after a successful authentication) and specifies what level of access or actions that user is allowed to perform.
      We would have mentioned 'Authorization' in place of Authentication.
      Thank you for taking the time to alert us to this. Rest assured, we're committed to ensuring that such mistakes won't occur in our upcoming videos.
      Thanks,
      Certification Terminal team.

  • @aravinda3272
    @aravinda3272 9 місяців тому +2

    Good questions. Thanks for explaining why the remaining are wrong. Looking forward for more videos.

    • @CertificationTerminal
      @CertificationTerminal  9 місяців тому

      You're most welcome, more are on their way. Our motto is to provide more knowledge on the topics, instead of just a Q &A session. Please share the video to your friends if the questions are knowledgeable.

  • @ekeneodakpo2066
    @ekeneodakpo2066 8 місяців тому +1

    This video is awesome. Thank you sir

    • @CertificationTerminal
      @CertificationTerminal  8 місяців тому

      Thank you very much for your feedback. I'm glad, this video is insightful. Stay tuned for more content. Always please provide your valuable feedback. Your support means a lot to us!

  • @Continental973
    @Continental973 8 місяців тому +1

    Excellent

  • @joewellosobni943
    @joewellosobni943 6 місяців тому +1

    Q9 has no red colour for D answer encryption.

    • @CertificationTerminal
      @CertificationTerminal  6 місяців тому

      Thanks for bringing this to our attention. We'll make sure to address these concerns in our upcoming videos.

  • @porschiatv
    @porschiatv 7 місяців тому +1

    Thanks for sharing this resource! Are these questions written/presented in a similar format as the ones on the actual exam?

    • @CertificationTerminal
      @CertificationTerminal  7 місяців тому +5

      Yes they are, except the background and colors 🤭. Each question will have multiple options (I have encountered only 4 options throughout the exam) with radio buttons. If there are multiple answers to the questions, the answers will have check boxes ( I haven't seen though). Wish you all the best for your exam, and will wait to hear from you.

    • @porschiatv
      @porschiatv 7 місяців тому

      @@CertificationTerminalThanks so much!!

    • @CertificationTerminal
      @CertificationTerminal  7 місяців тому

      @@porschiatv You're welcome!

  • @habibayari3365
    @habibayari3365 7 місяців тому +1

    Thanks for sharing ...if possible can you share with us pdf file for we can test our knowledge better

    • @CertificationTerminal
      @CertificationTerminal  7 місяців тому

      Dear Habib,
      I hope this message finds you well. I appreciate your interest in obtaining the PDF. However, I regret to inform you that I cannot share them due to concerns about potential copyright infringement from our third party vendor.
      I hope you understand that it's crucial to respect intellectual property rights. If you have any questions or need assistance in finding alternative resources, please don't hesitate to reach out. I'd be happy to help in any other way I can.
      Thank you for your understanding.
      Warm regards,
      Certification Terminal Team

    • @habibayari3365
      @habibayari3365 7 місяців тому +1

      @@CertificationTerminal thanks for replying ..I understand and your are absolutely right ... I think your contents is enaf and more and rely helping us thank again 🥰🥰🥰

    • @CertificationTerminal
      @CertificationTerminal  7 місяців тому

      @@habibayari3365 Anytime!

  • @moneyskilled5490
    @moneyskilled5490 8 місяців тому +1

    q11 answer shouldn't be B? Breach deals with PII

    • @CertificationTerminal
      @CertificationTerminal  8 місяців тому

      Thanks for reviewing the Q&As.
      A breach is considered as an unauthorized access of sensitive information. Where as, intrusion is a broader term that includes any unauthorized attempt to access or disrupt a computer system or network, which may or may not result in a breach.
      Breach isn't only specific to PII. However, it includes financial data, sensitive information, intellectual property, or any other type of information that is meant to be kept confidential.
      Hope this clears the uncertainty.

  • @adityagupta-mm2tw
    @adityagupta-mm2tw 7 місяців тому +1

    question 12 ans C Zero Fill. because we can use the ssd again.

    • @CertificationTerminal
      @CertificationTerminal  7 місяців тому +1

      Thanks for A2A. The catch here is 'BEST' approach. Disintegration (A.K.A shredding into pieces) is the best way to sanitize an un-used SSD. Also, please note that it ddn't mention to re-use the SSD.
      When writing to an SSD, the old block isn't directly overwritten due to a mechanism known as "wear leveling."
      To write on an SSD, it necessitates an erasure of the block beforehand. Subsequently, new data can be written. However, erasure is a finite operation; each time it's performed, it gradually degrades the hardware until the block can't be effectively erased anymore.
      Rather than repeatedly erasing and overwriting the same block, wear leveling intervenes. It directs the SSD to select an alternative, unused block for writing, while retaining the data in the original block.
      This ensures that the data on the old block remains accessible for reading.

    • @adityagupta-mm2tw
      @adityagupta-mm2tw 7 місяців тому +1

      @@CertificationTerminal Thanks for the explanation. I did not knew about the part that it gradually degrades the hardware .

    • @CertificationTerminal
      @CertificationTerminal  7 місяців тому +1

      @@adityagupta-mm2tw You're welcome my dear friend. Plz visit other videos too and provide your review comments. Also, I request you to share these videos to whom so ever they are useful.

  • @habibayari3365
    @habibayari3365 7 місяців тому +1

    hello dear :-) i need your help in this question maby its eazy question by other poeoples but for me its important to define his concept i think its question of the trap....
    ( You work for a financial institution, and a colleague accidentally sent an email containing sensitive customer data to the wrong recipient. What security principle has been compromised in this scenario? )
    a) Confidentiality
    b) Availability
    c) Integrity
    d) Authentication

    • @CertificationTerminal
      @CertificationTerminal  7 місяців тому +1

      Thanks for A2A.
      The correct answer is Option A: Confidentiality.
      Confidentiality is the security principle that ensures that sensitive information is only accessible to those who have the proper authorization. In this scenario, the colleague's accidental email sent to the wrong recipient compromised the confidentiality of the sensitive customer data. This information was disclosed to an unauthorized party, which goes against the principle of confidentiality.
      Option B: Availability - is incorrect.
      After colleague sent the sensitive information, none of the servers have gone down or any service went unavailable.
      Option C: Integrity - is incorrect.
      No data has been effect after colleague accidentally sent the mail.
      Option D: Authentication - is incorrect.
      Here none of the user credentials were compromised.
      So the correct answer is Option A: Confidentiality

    • @habibayari3365
      @habibayari3365 7 місяців тому +1

      @@CertificationTerminal thank you very much now it's clear

    • @CertificationTerminal
      @CertificationTerminal  7 місяців тому

      @@habibayari3365 - Pleasure is mine.