Fundamentals Exam
Question 1. Which principle ensures that users are only given the
minimum level of access needed to perform their duties?
A) Separation of Duties
B) Least Privilege
C) Defense in Depth
D) Need to Know
Answer: B
Explanation: The principle of least privilege restricts access rights for
users to the bare minimum permissions they need to do their jobs,
reducing potential attack surfaces.
Question 2. What is the primary objective of asset management in
cybersecurity?
A) Increase hardware lifespan
B) Track and protect organizational assets
C) Reduce software licensing costs
D) Ensure environmental safety
Answer: B
, ISACA DNU_Cybersecurity
Fundamentals Exam
Explanation: Asset management focuses on identifying, tracking, and
protecting all assets to ensure their confidentiality, integrity, and
availability.
Question 3. Which security tool is used to monitor network traffic and
identify suspicious activities?
A) DLP
B) SIEM
C) IDS
D) VPN
Answer: C
Explanation: Intrusion Detection Systems (IDS) monitor network traffic
for suspicious activity and known threats, alerting security personnel to
incidents.
Question 4. What does a patch management process primarily address?
A) Software functionality updates
B) Vulnerability remediation
C) Data encryption
, ISACA DNU_Cybersecurity
Fundamentals Exam
D) Backup scheduling
Answer: B
Explanation: Patch management aims to identify, test, and deploy
patches to fix vulnerabilities in systems and applications.
Question 5. Which of the following is NOT a principle of security
architecture?
A) Least Privilege
B) Defense in Depth
C) Open Access
D) Segregation of Duties
Answer: C
Explanation: Open access contradicts security principles; the correct
ones are least privilege, defense in depth, and segregation of duties.
Question 6. What is the main purpose of a firewall in network security?
A) Encrypt data
B) Filter incoming and outgoing network traffic
C) Detect malware
, ISACA DNU_Cybersecurity
Fundamentals Exam
D) Manage user passwords
Answer: B
Explanation: Firewalls control and filter network traffic based on
predetermined security rules, acting as a barrier between trusted and
untrusted networks.
Question 7. At which phase of the asset management lifecycle should
security requirements be defined?
A) Disposal
B) Acquisition
C) Operation
D) Maintenance
Answer: B
Explanation: Security requirements should be established during the
acquisition phase to ensure assets are procured securely.
Question 8. Which type of attack involves overwhelming a network or
service with excessive traffic?
A) Phishing