100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISACA Studying Cyber Security Fundamentals Questions with Accurate Answers

Rating
-
Sold
-
Pages
30
Grade
A+
Uploaded on
24-07-2025
Written in
2024/2025

____ are solutions to software programming and coding errors correct answer Patches _____ is a class of malware that hides the existence of other malware by modifying the underlying operating system correct answer Rootkit ______ communicates required and prohibited activities and behaviors correct answer Policies ______ contain step-by-step instructions to carry out procedures correct answer Guidelines _______ includes many components such as directory services, authentication and authorization services, and user management capabilities such as provisioning and deprovisioning correct answer Identity Management _______ provides details on how to comply with policies and standards. correct answer Procedures ________ also called malicious code, is software designed to gain access to targeted computer systems. steal info or disrupt computer operations. correct answer Malware _________ are used to interpret policies in specific situations correct answer Standards

Show more Read less
Institution
Cybersecurity For Technical Staff
Course
Cybersecurity for Technical Staff










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cybersecurity for Technical Staff
Course
Cybersecurity for Technical Staff

Document information

Uploaded on
July 24, 2025
Number of pages
30
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISACA Studying Cyber Security
Fundamentals Questions with
Accurate Answers
____ are solutions to software programming and coding errors correct answer
Patches


_____ is a class of malware that hides the existence of other malware by
modifying the underlying operating system correct answer Rootkit


______ communicates required and prohibited activities and behaviors correct
answer Policies


______ contain step-by-step instructions to carry out procedures correct answer
Guidelines


_______ includes many components such as directory services, authentication
and authorization services, and user management capabilities such as
provisioning and deprovisioning correct answer Identity Management


_______ provides details on how to comply with policies and standards. correct
answer Procedures


________ also called malicious code, is software designed to gain access to
targeted computer systems. steal info or disrupt computer operations. correct
answer Malware

,_________ are used to interpret policies in specific situations correct answer
Standards


____________________ is defined as "a model for enabling convenient, on-
demand network access to a shared pool of configurable resources (e.g.,
networks, servers, storage, applications and services) that can be rapidly
provisioned and released with minimal management or service provider
interaction."
a. Software as a Service (SaaS)
b. Cloud computing
c. Big data
d. Platform as a Service (PaaS) correct answer B. Cloud Computing


A _______ is something of value worth protecting. correct answer Asset


A ________ is anything capable of acting against an asset in a manner that can
cause harm. correct answer Threat


A _________ is a weakness in the design, implementation, operation or internal
controls in a process that could be exploited to violate the system security correct
answer vulnerability


A router is at what layer of the OSI model correct answer Network


A security architecture which emphasizes the protection of data regardless of its
location correct answer Data Centric

, A violation or immanent threat of violation of a computer security policies or
standard security practices.
A) Threat
B) Event
C) Incident correct answer C) Incident


Access control policy correct answer provides proper access to internal and
external stakeholders to accomplish business goals. examples:
-number of access violations that exceed the amount allowed
- amount of work disruption due to insufficient access rights
- number of segregation of duties incidents or audit findings


adversarial vs non adversarial threats correct answer adversarial= human mande
threat
non adversarial = error, malfunction or mishap


Any change, error or interruption within an IT infrastructure such as a system
crash, disk error or a user forgetting their password.
A) Occurrence
B) Incident
C)Event correct answer C) Event


Approaches to cybersecurity: Ad Hoc correct answer implements security with no
particular rational or criteria

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
starwid Yale University
View profile
Follow You need to be logged in order to follow users or courses
Sold
13
Member since
7 months
Number of followers
1
Documents
8643
Last sold
1 month ago

3.3

4 reviews

5
1
4
0
3
2
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions