100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISACA Cybersecurity Exam Questions with Accurate Answers

Rating
-
Sold
-
Pages
44
Grade
A+
Uploaded on
24-07-2025
Written in
2024/2025

Acceptable Use policy correct answer A policy that establishes an agreement between users and the enterprise and defines for all parties' the ranges of use that are approved before gaining access to a network or the Internet. Access control list (ACL) correct answer An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals. Scope Notes: Also referred to as access control tables. Access rights correct answer The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy. Accountability correct answer The ability to map a given activity or event back to the responsible party. Advanced Encryption Standard (AES) correct answer A public algorithm that supports keys from 128 bits to 256 bits in size Advanced persistent threat (APT) correct answer An adversary that possesses sophisticated levels of expertise and significant resources that allow it to create opportunities to achieve its objectives by using multiple attack vectors, including cyber, physical and deception. Typically, APT objectives include establishing and extending footholds within the IT infrastructure of the targeted organizations for purposes of exfiltrating information, or undermining or impeding critical aspects of a mission, program or organization; or positioning itself to carry out those

Show more Read less
Institution
Cybersecurity For Technical Staff
Course
Cybersecurity for Technical Staff











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cybersecurity for Technical Staff
Course
Cybersecurity for Technical Staff

Document information

Uploaded on
July 24, 2025
Number of pages
44
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISACA Cybersecurity Exam
Questions with Accurate
Answers
Acceptable Use policy correct answer A policy that establishes an agreement
between users and the enterprise and defines for all parties' the ranges of use
that are approved before gaining access to a network or the Internet.


Access control list (ACL) correct answer An internal computerized table of access
rules regarding the levels of computer access permitted to logon IDs and
computer terminals. Scope Notes: Also referred to as access control tables.


Access rights correct answer The permission or privileges granted to users,
programs or workstations to create, change, delete or view data and files within a
system, as defined by rules established by data owners and the information
security policy.


Accountability correct answer The ability to map a given activity or event back to
the responsible party.


Advanced Encryption Standard (AES) correct answer A public algorithm that
supports keys from 128 bits to 256 bits in size


Advanced persistent threat (APT) correct answer An adversary that possesses
sophisticated levels of expertise and significant resources that allow it to create
opportunities to achieve its objectives by using multiple attack vectors, including
cyber, physical and deception. Typically, APT objectives include establishing and
extending footholds within the IT infrastructure of the targeted organizations for

,purposes of exfiltrating information, or undermining or impeding critical aspects
of a mission, program or organization; or positioning itself to carry out those
objectives in the future. The advanced persistent threat pursues its objectives
repeatedly, over an extended period, adapts to defenders' efforts to resist it and
is determined to maintain the level of interaction that is needed to execute its
objectives. Source: NIST SP 800-39


Adversary correct answer A threat agent


Adware correct answer A software package that automatically plays, displays or
downloads advertising material to a computer after the software is installed on it
or while the application is being used. Scope Notes: In most cases, this is done
without any notification to the user or without the user's consent. The term
adware may also refer to software that displays advertisements, whether or not it
does so with the user's consent; such programs display advertisements as an
alternative to shareware registration fees. These are classified as adware in the
sense of advertising supported software, but not as spyware. Adware in this form
does not operate surreptitiously or mislead the user, and it provides the user with
a specific service.


Analog correct answer A transmission signal that varies continuously in amplitude
and time and is generated in wave formation. Scope Notes: Analog signals are
used in telecommunications


Antimalware correct answer A widely used technology to prevent, detect and
remove many categories of malware, including computer viruses, worms, Trojans,
keyloggers, malicious browser plug-ins, adware and spyware


Antivirus software correct answer An application software deployed at multiple
points in an IT architecture. It is designed to detect and potentially eliminate virus

,code before damage is done and repair or quarantine files that have already been
infected.


Application layer correct answer In the Open Systems Interconnection (OSI)
communications model, the application layer provides services for an application
program to ensure that effective communication with another application
program in a network is possible.


Architecture correct answer Description of the fundamental underlying design of
the components of the business system, or of one element of the business system
(e.g., technology), the relationships among them, and the manner in which they
support enterprise objectives.


Asset correct answer Something of either tangible or intangible value that is
worth protecting, including people, information, infrastructure, finances and
reputation.


Asymmetric key (public key) correct answer A cipher technique in which different
cryptographic keys are used to encrypt and decrypt a message. Scope Notes: See
public key encryption.


Attack correct answer An actual occurrence of an adverse event


Attack mechanism correct answer A method used to deliver the exploit. Unless
the attacker is personally performing the attack, an attack mechanism may
involve a payload, or container, that delivers the exploit to the target.

, Attack vector correct answer A path or route used by the adversary to gain access
to the target (asset). Scope Notes: There are two types of attack vectors: ingress
and egress (also known as data exfiltration)


Audit trail correct answer Data in the form of a logical path linking a sequence of
events, used to trace the transactions that have affected the contents of a record.
Source : ISO


Authentication correct answer 1. The act of verifying identity, i.e., user, system.
Scope Notes: Risk: Can also refer to the verification of the correctness of a piece
of data. 2. The act of verifying the identity of a user, the user's eligibility to access
computerized information. Scope Notes: Assurance: Authentication is designed to
protect against fraudulent logon activity. It can also refer to the verification of the
correctness of a piece of data.


Authenticity correct answer Undisputed authorship


Availability correct answer Ensuring timely and reliable access to and use of
information


Back door correct answer A means of regaining access to a compromised system
by installing software or configuring existing software to enable remote access
under attacker-defined conditions


Bandwidth correct answer The range between the highest and lowest
transmittable frequencies. It equates to the transmission capacity of an electronic
line and is expressed in bytes per second or Hertz (cycles per second).


Bastion correct answer System heavily fortified against attacks

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
starwid Yale University
View profile
Follow You need to be logged in order to follow users or courses
Sold
13
Member since
7 months
Number of followers
1
Documents
8643
Last sold
1 month ago

3.3

4 reviews

5
1
4
0
3
2
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions