100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISACA CYBERSECURITY FUNDAMENTALS CERTIFICATION EXAM QUESTIONS WITH ACCURATE ANSWERS

Rating
-
Sold
-
Pages
28
Grade
A+
Uploaded on
24-07-2025
Written in
2024/2025

Agile Development correct answer A software development methodology that delivers functionality in rapid iterations, measured in weeks, requiring frequent communication, development, testing, and delivery. It works opportunities for reevaluation of the project within the project plan, allowing for the schedule to be flexible and adaptable Anti-forensics correct answer An approach to manipulate, erase, or obfuscate digital data or to make its examination difficult, time-consuming, or virtually impossible Application firewall systems correct answer Def: Allow information to flow between systems but do not allow the direct exchange of packets. Provide greater protection than packet filtering. Work at the application level of OSI model Types: 1) Application level gateways - proxy for each service; impacts network performance 2) Circuit level gateways - one proxy for all services; more efficient Advantages: - Provide security for commonly used protocols - generally hide network from outside untrusted networks - ability to protect the entire network by limiting break-ins to the firewall itself - ability to examine and secure program code

Show more Read less
Institution
Cybersecurity For Technical Staff
Course
Cybersecurity for Technical Staff










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cybersecurity for Technical Staff
Course
Cybersecurity for Technical Staff

Document information

Uploaded on
July 24, 2025
Number of pages
28
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISACA CYBERSECURITY FUNDAMENTALS
CERTIFICATION EXAM QUESTIONS WITH
ACCURATE ANSWERS
Agile Development correct answer A software development methodology that
delivers functionality in rapid iterations, measured in weeks, requiring frequent
communication, development, testing, and delivery. It works opportunities for
reevaluation of the project within the project plan, allowing for the schedule to be
flexible and adaptable


Anti-forensics correct answer An approach to manipulate, erase, or obfuscate
digital data or to make its examination difficult, time-consuming, or virtually
impossible


Application firewall systems correct answer Def: Allow information to flow
between systems but do not allow the direct exchange of packets. Provide greater
protection than packet filtering. Work at the application level of OSI model


Types:
1) Application level gateways - proxy for each service; impacts network
performance
2) Circuit level gateways - one proxy for all services; more efficient


Advantages:
- Provide security for commonly used protocols
- generally hide network from outside untrusted networks
- ability to protect the entire network by limiting break-ins to the firewall itself
- ability to examine and secure program code

,Disadvantages:
- reduced performance and scalability as internet usage grows


Approaches to Cybersecurity Risk correct answer Dependent on:
1) Risk tolerance
2) Size & scope of the environment
3) Amount of data available


Approaches:
1) Ad hoc
2) Compliance-based
3) Risk-based


Asset correct answer something of either tangible or intangible value that is
worth protecting


Asymmetric key correct answer pairs of unidirectional, complementary keys that
only encrypt or decrypt; one of these is secret and the other is publically known;
ideal for short messages (i.e. digital signatures, distribute symmetric keys)


Advantages:
1) Easier distributing keys to untrusted, unknown users
2) Provides authentication/nonrepudiation - sender only knows the private key

, Disadvantages:
1) computationally intensive and slow


Attack Attributes correct answer 1) Attack Vector
2) Payload
3) Exploit
4) Vulnerability
5) Target (Asset)


Attack vector correct answer The path or route used to gain access to the target
(asset)


Types:
1) Ingress - intrusion
2) Egress - Data removal


Attack-signature-detection tools correct answer These look for an attack
signature, which is a specific sequence of events indicative of an unauthorized
access attempt. A simple example would be repeated failed logon attempts.


Attrition correct answer An attack that employs brute force methods to
compromise, degrade, or destroy systems, networks or services


Audit reduction tools correct answer Preprocessors designed to reduce the
volume of audit records to facilitate manual review. Used to analyze large log files

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
starwid Yale University
View profile
Follow You need to be logged in order to follow users or courses
Sold
13
Member since
7 months
Number of followers
1
Documents
8643
Last sold
1 month ago

3.3

4 reviews

5
1
4
0
3
2
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions