100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CSX Cybersecurity Fundamentals UPDATED QUESTIONS and CORRECT Answers

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
18-12-2024
Written in
2024/2025

CSX Cybersecurity Fundamentals UPDATED QUESTIONS and CORRECT Answers - Redundancy - Backups - access controls - CORRECT ANSWER - Three common controls used to protect the availability of information are

Institution
CSX
Course
CSX










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSX
Course
CSX

Document information

Uploaded on
December 18, 2024
Number of pages
17
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CSX Cybersecurity Fundamentals
UPDATED QUESTIONS and CORRECT
Answers
- Redundancy
- Backups

- access controls - CORRECT ANSWER - Three common controls used to protect the
availability of information are


Providing strategic direction, Ensuring that objectives are achieved, Verifying that organizational
resources are being used appropriately, Ascertaining whether risk is being managed properly. -
CORRECT ANSWER - Governance has several goals, including


- Protect,
- Recover

- Identify - CORRECT ANSWER - According to the NIST framework, which of the
following are considered key functions necessary for the protection of digital assets?


Protecting information assets by addressing threats to information that is processed, stored or
transported by interworked information systems - CORRECT ANSWER - The best
definition for cybersecurity?


Cybersecurity management - CORRECT ANSWER - Cybersecurity role that is charged
with the duty of managing incidents and remediation?


risk to an organization's digital assets. - CORRECT ANSWER - The core duty of
cybersecurity is to identify, respond and manage


is anything capable of acting against an asset in a manner that can cause harm. - CORRECT
ANSWER - A threat

,is something of value worth protecting. - CORRECT ANSWER - A asset


is a weakness in the design, implementation, operation or internal controls in a process that could
be exploited to violate the system security - CORRECT ANSWER - A vulnerability



attack vector - CORRECT ANSWER - The path or route used to gain access to the target
asset is known as a


payload - CORRECT ANSWER - In an attack, the container that delivers the exploit to the
target is called


communicate required and prohibited activities and behaviors. - CORRECT ANSWER -
Policies


is a class of malware that hides the existence of other malware by modifying the underlying
operating system. - CORRECT ANSWER - Rootkit



provide details on how to comply with policies and standards. - CORRECT ANSWER -
Procedures


contain step-by-step instructions to carry out procedures. - CORRECT ANSWER -
Guidelines


also called malicious code, is software designed to gain access to targeted computer systems,
steal information or disrupt computer operations. - CORRECT ANSWER - Malware



are used to interpret policies in specific situations. - CORRECT ANSWER - Standards

, are solutions to software programming and coding errors. - CORRECT ANSWER -
Patches


includes many components such as directory services, authentication and authorization services,
and user management capabilities such as provisioning and deprovisioning. - CORRECT
ANSWER - Identity Management


Detect and block traffic from infected internal end points, Eliminate threats such as email spam,
viruses and worms, Control user traffic bound toward the Internet, Monitor and detect network
ports for rogue activity. - CORRECT ANSWER - The Internet perimeter should



ensures that data are transferred reliably in the correct sequence - CORRECT ANSWER -
Transport layer of the OSI


coordinates and manages user connections - CORRECT ANSWER - Session layer of the
OSI


Encryption is an essential but incomplete form of access control - CORRECT ANSWER -
best states the role of encryption within an overall cybersecurity program


Asset value, criticality, reliability of each control and degree of exposure. - CORRECT
ANSWER - The number and types of layers needed for defense in depth are a function of



Least privilege or access control - CORRECT ANSWER - System hardening should
implement the principle of


Accounting management, Fault management, Performance management, Security management -
CORRECT ANSWER - Which of the following are considered functional areas of network
management as defined by ISO?


Multiple guests coexisting on the same server in isolation of one another - CORRECT
ANSWER - Virtualization involves

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1067
Member since
1 year
Number of followers
102
Documents
68976
Last sold
12 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

168 reviews

5
73
4
30
3
43
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions