100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISACA Cyber Security Fundamentals - Intro to Cyber Security Objectives Questions with Accurate Answers

Rating
-
Sold
-
Pages
47
Grade
A+
Uploaded on
24-07-2025
Written in
2024/2025

_____________ key systems use pairs of unidirectional complementary keys that only encrypt or decrypt. correct answer asymmetric ______________ key systems use single secret bidirectional keys that encrypt and decrypt. correct answer symmetric - Mitigation - Analysis - Communications are activities associated with correct answer RESPONDING to attacks on digital assets -Access Control Awareness / Training -Data Security -Info Protection, Processes and Procedures are activities associated with........ correct answer PROTECTING digital assets -Anomalies and Events -Security Continuous Monitoring -Detection Processes are activities associated with................ correct answer DETECTING attacks on digital assets

Show more Read less
Institution
Cybersecurity For Technical Staff
Course
Cybersecurity for Technical Staff











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cybersecurity for Technical Staff
Course
Cybersecurity for Technical Staff

Document information

Uploaded on
July 24, 2025
Number of pages
47
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISACA Cyber Security Fundamentals -
Intro to Cyber Security Objectives
Questions with Accurate Answers
_____________ key systems use pairs of unidirectional complementary keys that
only encrypt or decrypt. correct answer asymmetric


______________ key systems use single secret bidirectional keys that encrypt and
decrypt. correct answer symmetric


- Mitigation
- Analysis
- Communications
are activities associated with correct answer RESPONDING to attacks on digital
assets


-Access Control
Awareness / Training
-Data Security
-Info Protection, Processes and Procedures
are activities associated with........ correct answer PROTECTING digital assets


-Anomalies and Events
-Security Continuous Monitoring
-Detection Processes

,are activities associated with................ correct answer DETECTING attacks on
digital assets


-Asset management
-Business environment
-Governance
-Risk assessment
-Risk Management
are activities associated with......... correct answer IDENTIFYING digital assets


-Recovery Planning
-Communications
-Continuous Improvements
are activities associated with....... correct answer RECOVERING from attacks on
digital assets


5 key functions for protection of digital assets correct answer 1. Identify,
2. Protect,
3. Detect,
4. Respond,
5. Recover


A business impact anaysis (BIA) provides the basis for which of the following:
Service delivery objectives
Maximum tolerable outages

,RPO
RTO correct answer all


A collection of threats is generally referred to as an:
- cyberwarefare
- advanced persistent threat (APT)
- Hacktivism
- Threat environment correct answer - Threat environment


A dynamic packet filtering firewall that tracks the IP address of each packet to
provide controls over the flow of IP traffic. Efficient but complex. correct answer
Stateful inspection firewall


A firewall that has two or more network interfaces, each connected to a different
network. Blocks and filters network traffic. correct answer A dual homed firewall.


A key limitation of anti malware is that it:
is not generally effective for known threats
-is not scalable as internet usage grows
-is complex to administer
-is generally not effective for malicious code yet to be identified correct answer -
is generally not effective for malicious code yet to be identified


A major incident which has grown out of control and increased in severity is
called:
Crisis

, Emergency
Incident
Event correct answer Crisis


A packet filtering router and bastion host together makes what kind of firewall
correct answer Screened host firewall.


A screening router that examines the header of every packet of data traveling
between the internet and the network. The router can then prevent certain
packets from being sent. correct answer Packet filtering firewall


A stateful inspection firewall is also known as:
DMZ
dual homed firewall
screened host firewall
dynamic packet filtering correct answer dynamic packet filtering


A weakness in the design, implementation, operation or internal control of a
process that could expose the system to adverse threats is called:
Risk
Asset
Threat
Vulnerability correct answer Vulnerability


A well defined boundary between the orgainzation and the outside world (even if
virtual) correct answer Security Perimeter

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
starwid Yale University
View profile
Follow You need to be logged in order to follow users or courses
Sold
13
Member since
7 months
Number of followers
1
Documents
8644
Last sold
1 month ago

3.3

4 reviews

5
1
4
0
3
2
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions