100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CSX Cybersecurity Fundamentals: Practice Questions with Accurate Answers

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
24-07-2025
Written in
2024/2025

- Accounting management - Fault management - Performance management - Security management correct answer What are considered functional areas of network management as defined by ISO? - an intruder must penetrate three separate devices - private network addresses are not disclosed to the internet - internal systems do not have direct access to the Internet correct answer The key benefits of the DMZ system are: - APTs typically originate from sources such as organized crime groups, activists or governments. - APTs use obfuscation techniques that help them remain undiscovered for months or even years. - APTs are often long-term, multi-phase projects with a focus on reconnaissance. correct answer Which of the following statements about advanced persistent threats (APTs) are true? - cloud computing - social media - mobile computing correct answer Which three elements of the current threat landscape have provided increased levels of access and connectivity, and therefore increased opportunities for cybercrime

Show more Read less
Institution
Cybersecurity For Technical Staff
Course
Cybersecurity for Technical Staff










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cybersecurity for Technical Staff
Course
Cybersecurity for Technical Staff

Document information

Uploaded on
July 24, 2025
Number of pages
20
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CSX Cybersecurity Fundamentals:
Practice Questions with Accurate
Answers
- Accounting management
- Fault management
- Performance management
- Security management correct answer What are considered functional areas of
network management as defined by ISO?


- an intruder must penetrate three separate devices
- private network addresses are not disclosed to the internet
- internal systems do not have direct access to the Internet correct answer The
key benefits of the DMZ system are:


- APTs typically originate from sources such as organized crime groups, activists or
governments.
- APTs use obfuscation techniques that help them remain undiscovered for
months or even years.
- APTs are often long-term, multi-phase projects with a focus on reconnaissance.
correct answer Which of the following statements about advanced persistent
threats (APTs) are true?


- cloud computing
- social media

,- mobile computing correct answer Which three elements of the current threat
landscape have provided increased levels of access and connectivity, and
therefore increased opportunities for cybercrime


- Costs shift to the user
- Worker satisfaction increases correct answer Which of the following are benefits
to BYOD?


- detect and block traffic from infected internal end points
- eliminate threats such as email spam, viruses and worms
- control user traffic bound toward the Internet
- monitor internal and external network ports for rogue activity correct answer
The Internet perimeter should:


- full
- incremental
- differential correct answer Types of backups


- Identify
- Protect
- Detect
- Respond
- Recover correct answer According to the NIST cybersecurity framework, what
are considered key functions necessary for the protection of digital assets?


- Logging

, - Digital Signatures
- Hashes
- Encryption correct answer Methods of control that can help protect integrity


- Organizational risk
- Technical risk
- Physical risk correct answer Choose three. Which types of risk are typically
associated with mobile devices?


- Planning
- Discovery
- Attack
- Reporting correct answer The steps of the penetration testing phase in the
correct order are:


- Preparation
- Detection and analysis
- Investigation
- Mitigation and recovery
- Post-incident analysis correct answer The steps of incident response in order
are:


- Protect,
- Recover
- Identify correct answer According to the NIST framework, which of the following
are considered key functions necessary for the protection of digital assets?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
starwid Yale University
View profile
Follow You need to be logged in order to follow users or courses
Sold
13
Member since
7 months
Number of followers
1
Documents
8648
Last sold
1 month ago

3.3

4 reviews

5
1
4
0
3
2
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions