100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ISACA Cybersecurity UPDATED Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
26-07-2025
Written in
2024/2025

ISACA Cybersecurity UPDATED Exam Questions and CORRECT Answers Write blocker - CORRECT ANSWER A device that allows the acquisition of information on a drive without creating the possibility of accidentally damaging the drive WPA3 - CORRECT ANSWER Wireless security protocol released mid-2018 that improves on WPA2 by eliminating preshared key (PSK), which is susceptible to dictionary attacks WPA2 - CORRECT ANSWER Wireless security protocol that supports 802.11i encryption standards to provide greater security. This protocol uses advanced encryption standards (AES) and temporal key integrity protocol (TKIP) for stronger encryption.

Show more Read less
Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
July 26, 2025
Number of pages
23
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISACA Cybersecurity UPDATED Exam
Questions and CORRECT Answers
Write blocker - CORRECT ANSWER A device that allows the acquisition of information on
a drive without creating the possibility of accidentally damaging the drive


WPA3 - CORRECT ANSWER Wireless security protocol released mid-2018 that improves
on WPA2 by eliminating preshared key (PSK), which is susceptible to dictionary attacks


WPA2 - CORRECT ANSWER Wireless security protocol that supports 802.11i encryption
standards to provide greater security. This protocol uses advanced encryption standards (AES)
and temporal key integrity protocol (TKIP) for stronger encryption.


Worm - CORRECT ANSWER A programmed network attack in which a self- replicating
program does not attach itself to programs, but rather spreads independently of users' action.


Wireless local area network (WLAN) - CORRECT ANSWER Wireless communication
network that serves several users within a specified limited geographic area


Wide area network (WAN) - CORRECT ANSWER A computer network connecting multiple
offices or buildings over a larger area.


Wi-Fi Protected Access (WPA) - CORRECT ANSWER A class of security protocols used to
secure wireless (Wi-Fi) computer networks


Web server - CORRECT ANSWER End-point hardware or software that serves web pages to
users


Vulnerability scanning - CORRECT ANSWER An automated process to proactively identify
security weaknesses in a network or individual system

,Vulnerability analysis - CORRECT ANSWER A process of identifying and classifying
vulnerabilities


Volatile data - CORRECT ANSWER Data that changes frequently and can be lost when the
system's power is shut down


Voice-over Internet Protocol (VoIP) - CORRECT ANSWER Also called IP Telephony,
Internet Telephony and Broadband Phone, a technology that makes it possible to have a voice
conversation over the Internet or over any dedicated Internet Protocol (IP) network instead of
over dedicated voice transmission lines.


Virus signature - CORRECT ANSWER The file of virus patterns that are compared with
existing files to determine whether they are infected with a virus or worm.


Virus - CORRECT ANSWER Piece of code that can replicate itself and spread from one
computer to another. It requires intervention or execution to replicate and/or cause damage. See
Bomb, Trojan horse and worm.


Virtualization - CORRECT ANSWER The process of adding a "guest application" and data
onto a "virtual server," recognizing that the guest application will ultimately part company from
this physical server.


Virtual local area network (VLAN) - CORRECT ANSWER Logical segmentation of a LAN
into different broadcast domains. Scope Notes: A VLAN is set up by configuring ports on a
switch, so devices attached to these ports may communicate as if they were attached to the same
physical network segment, although the devices are located on different LAN segments. A
VLAN is based on logical rather than physical connections.


Vertical defense-in depth - CORRECT ANSWER Controls are placed at different system
layers—hardware, operating system, application, database or user levels


User provisioning - CORRECT ANSWER A process to create, modify, disable and delete
user accounts and their profiles across IT infrastructure and business applications

, User mode - CORRECT ANSWER Used for the execution of normal system activities



User Datagram Protocol (UDP) - CORRECT ANSWER A connectionless Internet protocol
that is designed for network efficiency and speed at the expense of reliability


Uniform resource locator (URL) - CORRECT ANSWER The string of characters that form a
web address


Tunnel mode - CORRECT ANSWER Used to protect traffic between different networks
when traffic must travel through intermediate or untrusted networks. Tunnel mode encapsulates
the entire IP packet with and AH or ESP header and an additional IP header.


Tunnel - CORRECT ANSWER The paths that the encapsulated packets follow in an Internet
virtual private network (VPN).


Triple DES (3DES) - CORRECT ANSWER A block cipher created from the Data Encryption
Standard (DES) cipher by using it three times. 3DES was broken in 2016.


Transport Layer Security (TLS) - CORRECT ANSWER A cryptographic protocol that
provides secure communications, endpoint security and privacy on the Internet


Transmission Control Protocol Internet Protocol (TCP/IP) - CORRECT ANSWER Provides
the basis for the Internet; a set of communication protocols that encompass media access, packet
transport, session communication, file transfer, electronic mail (email), terminal emulation,
remote file access and network management.


Transmission Control Protocol (TCP) - CORRECT ANSWER A connection- based Internet
protocol that supports reliable data transfer connections. Scope Notes: Packet data are verified
using checksums and retransmitted if they are missing or corrupted. The application plays no
part in validating the transfer.
$12.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
Follow You need to be logged in order to follow users or courses
Sold
1067
Member since
1 year
Number of followers
102
Documents
68976
Last sold
5 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

168 reviews

5
73
4
30
3
43
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions