ISC2 • CC
The ISC2 Certified in Cybersecurity (CC) validates foundational knowledge and skills required for entry- or junior-level cybersecurity roles. It covers security principles, access controls, network security, and incident response concepts.
Questions
838
Duration
120 minutes
Passing Score
700/1000
Difficulty
FoundationalLast Updated
Mar 2026
The ISC2 Certified in Cybersecurity (CC) is an entry-level certification developed by ISC2 — the world's largest association of certified cybersecurity professionals — to validate foundational knowledge and skills required for junior cybersecurity roles. The credential covers five core domains: Security Principles (including the CIA triad, risk management, and governance), Business Continuity and Disaster Recovery, Access Controls, Network Security, and Security Operations. It is accredited by ANAB to ISO/IEC Standard 17024, signifying its adherence to internationally recognized standards for personnel certification.
The CC was created specifically to address the global cybersecurity workforce shortage, which ISC2 estimated at nearly 4.8 million unfilled positions in 2024. It serves as both a standalone entry-level credential and a structured pathway to advanced ISC2 certifications such as the CISSP. Uniquely among professional certifications, ISC2 has offered free training and exam vouchers to qualifying candidates as part of its One Million Certified in Cybersecurity initiative, significantly lowering the barrier to entry for career changers and new graduates.
The CC is designed for individuals at the beginning of their cybersecurity careers, including career changers transitioning from unrelated fields, recent college graduates or current students in IT or computer science programs, and IT generalists looking to formalize their security knowledge. ISC2 explicitly states that no prior work experience in cybersecurity or IT is required to sit for the exam, making it one of the most accessible professional certifications available.
The credential is particularly well-suited for individuals in roles such as help desk technician, IT support specialist, or junior systems administrator who want to move into dedicated security positions like SOC Analyst, Security Analyst, or IT Security Specialist. Analytical, problem-solving individuals who are new to the field but want a recognized credential to validate their foundational knowledge will benefit most from pursuing the CC.
ISC2 does not impose any formal prerequisites for the CC exam — there is no minimum work experience requirement, no prior certifications required, and no educational prerequisites. This policy sets the CC apart from nearly all other professional security credentials and makes it accessible to complete newcomers to the field.
While not required, ISC2 recommends familiarity with basic IT concepts before studying for the exam. Candidates who have completed coursework in networking fundamentals, operating systems, or general IT principles will find the material easier to absorb. After passing the exam, candidates must pay a $50 Annual Maintenance Fee (AMF) to complete certification and gain ISC2 member status; no endorsement from an existing ISC2 member is required, unlike the CISSP process.
The CC exam consists of 100 to 125 items, which include multiple-choice questions and advanced item types such as drag-and-drop and hotspot questions. The time limit is 2 hours (120 minutes). The exam is delivered via Pearson VUE in a computerized adaptive testing (CAT) format, available at authorized testing centers worldwide or via online proctoring. The exam is offered in English, Chinese, Japanese, German, and Spanish.
Scoring is on a scale of 0 to 1000, and the passing score is 700. The adaptive format means the difficulty of questions adjusts dynamically based on candidate performance, and the total number of questions delivered may vary within the 100–125 range depending on the test engine's assessment of candidate ability. Candidates should be prepared for both straightforward knowledge-recall questions and scenario-based items that require applying concepts to real-world situations.
Earning the CC positions candidates for entry-level and junior cybersecurity roles in a field that the U.S. Bureau of Labor Statistics projects will grow 32% by 2032 — more than ten times the average growth rate across all occupations. Common job titles pursued by CC holders include SOC Analyst, Security Analyst, IT Security Specialist, and Cybersecurity Technician, with entry-level salaries in the United States typically ranging from $60,000 to $85,000 annually. ISC2 reports that its certified members earn 35% higher salaries than non-members, and survey data shows that 10% of CC holders received a salary increase and 7% received a promotion within their first certification cycle.
Beyond immediate job placement, the CC serves as the foundational step in the ISC2 certification pathway, familiarizing candidates with ISC2's exam format and professional standards before advancing toward credentials such as the SSCP or CISSP. Compared to alternatives like CompTIA Security+, the CC's lack of prerequisites and free exam availability make it a lower-risk entry point, while ISC2's brand recognition — as the organization behind CISSP, the most recognized advanced security certification globally — lends the CC meaningful credibility with hiring managers and HR systems that filter for ISC2 credentials.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 838 questions.
1. A security administrator is categorizing the organization's security controls for a compliance audit. She classifies employee security awareness training that teaches users to recognize phishing emails. Which two classifications correctly describe this control? (Select two!)
Multiple correct answersExplanation
Security awareness training is an administrative control because it involves policies, procedures, and educational processes rather than technical systems or physical mechanisms. It is also a preventive control because its purpose is to stop security incidents before they occur by teaching employees to avoid falling victim to phishing attacks. Training does not detect incidents after they occur, so it is not a detective control. Technical controls are software or hardware-based, and physical controls are tangible security mechanisms.
2. A healthcare organization must secure wireless access across their hospital campus. They decide to implement separate wireless networks: WPA3-Personal for the guest network allowing patient and visitor internet access, and WPA2-Enterprise with 802.1X authentication using RADIUS for the corporate network accessing electronic health records. Why is this combination appropriate? (Select one!)
Explanation
WPA2-Enterprise with 802.1X and RADIUS provides centralized authentication where each healthcare employee has individual credentials, enabling accountability and audit trails required for accessing electronic health records. The RADIUS server validates credentials and can enforce security policies. WPA3-Personal for the guest network provides improved security over WPA2-Personal through Simultaneous Authentication of Equals (SAE), protecting against password guessing attacks without requiring the complexity of individual user accounts for temporary guest access. WPA3-Personal is not stronger than WPA2-Enterprise; Enterprise mode with RADIUS provides better security for corporate environments. The encryption standards differ and the choice is not merely convenience. Neither WPA version is specifically required by HIPAA; the regulation requires appropriate safeguards.
3. A network security engineer needs to segment the corporate network to isolate guest wireless users, internal employees, servers, and IoT devices into separate broadcast domains even though they connect to the same physical switch infrastructure. Which network technology provides this logical segmentation capability? (Select one!)
Explanation
Virtual Local Area Networks create logical network segments on shared physical switch infrastructure, allowing different groups of devices to be isolated into separate broadcast domains regardless of physical location or port connectivity. Each VLAN operates as a distinct network segment with its own security policies, and traffic between VLANs must pass through a router or Layer 3 switch where security controls can be applied. This enables the guest wireless, employee, server, and IoT devices to be completely separated while using the same switches. VPNs create encrypted tunnels over untrusted networks but do not provide local network segmentation. NAT translates private IP addresses to public addresses for internet connectivity. DMZ is a physical or logical security zone between internal and external networks, typically hosting public-facing services, but does not provide the flexible multi-segment capability that VLANs offer.
4. During a security audit, you observe that a legacy file server allows users to grant access permissions to their own files and folders to any other user on the network without administrator approval. Users can share files directly with colleagues by modifying Access Control Lists. Which access control model is being used? (Select one!)
Explanation
Discretionary Access Control (DAC) allows resource owners to determine and manage access permissions for their own resources, typically through Access Control Lists (ACLs). In DAC systems, users have discretion to share their files and grant permissions to other users without requiring administrator intervention. This is the most common access control model in commercial environments and provides flexibility but is considered the least secure because users can freely delegate access. Mandatory Access Control requires a central authority to assign access through security labels and users cannot modify permissions. Role-Based Access Control assigns permissions to roles managed by administrators, not individual resource owners. Rule-Based Access Control applies uniform rules across all users based on conditions like time or location, not owner decisions.
5. An organization processes credit card transactions and must comply with PCI DSS requirements. They need to implement encryption for cardholder data during transmission across public networks. Which encryption approach provides the fastest performance for protecting large volumes of transaction data? (Select one!)
Explanation
Symmetric encryption algorithms like AES-256 are significantly faster than asymmetric algorithms and are designed for encrypting large volumes of data efficiently. Real-world systems use symmetric encryption for bulk data protection due to performance advantages. Asymmetric encryption using RSA is much slower and computationally intensive, making it impractical for large-scale transaction encryption. Hashing provides integrity verification but does not encrypt data for confidentiality during transmission. While ECC offers strong security with smaller keys, symmetric encryption still provides superior performance for bulk data encryption.
One-time access to this exam