100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

iSACA Cybersecurity Fundamentals Certification Exam Questions With Correct Answers Already Passed!!

Rating
-
Sold
-
Pages
37
Grade
A+
Uploaded on
13-09-2025
Written in
2025/2026

iSACA Cybersecurity Fundamentals Certification Exam Questions With Correct Answers Already Passed!!

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
September 13, 2025
Number of pages
37
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

iSACA Cybersecurity Fundamentals Certification Exam Question
With Cor
rect Answers Already
Passed!!
1. Confidentiality Protection from unauthorized access

2. integrity Protection from unauthorized modification

3. Availability protection from disruptions in access

4. Cybersecurity the protection of information assets (digital assets) by addressing threats t
information processed, stored, and transported by internetworked informati
systems

5. NIST IPDRR
Functions to
Protect Digital 1) Identify
Assets 2) Protect
3) Detect
4) Respond
5) Recover

6. Nonrepudiation Def: ensuring that a message or other piece of information is genuine

Examples: digital signatures and transaction logs

7. Risk combination of the probability of an event and its consequences, mitigated
through controls

8. Threat Anything that is capable of acting against an asset in a harmful manner

9. Asset something of either tangible or intangible value that is worth protecting

10. Vulnerability A weakness in the design, implementation, operation or internal control of
process that could expose the system to adverse threats from threat events

11. Inherent risk


1/
37

, iSACA Cybersecurity Fundamentals Certification Exam Question
With Cor
rect Answers Already
Passed!!
The risk level or exposure without taking into account the actions that
manage- ment has taken or might take (e.g., implementing controls)

12. Residual risk the risk that remains after management implements internal controls or
some
other response to risk

13. Likelihood A.K.A probability

measure of frequency of which an event may occur, which depends on the
threat and vulnerability

14. Approaches Dependent on:
to 1) Risk tolerance
Cybersecuri
2) Size & scope of the environment
ty Risk
3) Amount of data available

Approaches:
1) Ad hoc
2) Compliance-based
3) Risk-based

15. Threat Agents The actors causing the threats that might exploit a vulnerability

Types:
1) Corporations - competitive advantage
2) Cybercriminals - profit
3) Cyberterrorists - critical infrastructures/government
4) Cyberwarriors - politically motivated
5) Employees - revenge
6) Hacktivists - politically motivated
7) Nation states - government/private entities

2/
37

, iSACA Cybersecurity Fundamentals Certification Exam Question
With Cor
rect Answers Already
Passed!!
8) Online social hackers - identity theft, profit
9) Script kiddies - learning to hack

16. Attack vector The path or route used to gain access to the target (asset)

Types:
1) Ingress - intrusion
2) Egress - Data removal

17. Attack Attributes 1) Attack Vector
2) Payload
3) Exploit
4) Vulnerability
5) Target (Asset)

18. Threat Process 1) Perform reconnaissance (gathering information)
2) Create attack tools
3) Deliver malicious capabilities
4) Exploit and compromise
5) Conduct an attack
6) Achieve results
7) Maintain a presence or set of capabilities
8) Coordinate a campaign

19. Malware Def: software designed to infiltrate or damage a computer system without
the
user's informed consent

Examples: Viruses, network worms, Trojan horses

20. Policies communicate required and prohibited activities and behaviors

21. Standards Interpret policies in specific situations

3/
37

, iSACA Cybersecurity Fundamentals Certification Exam Question
With Cor
rect Answers Already
Passed!!
22. Procedures Provide details on how to comply with policies and standards

23. Guidelines Provide general guidance on issues; not requirements but strongly
recommended

24. Defense in Depth Layering defenses to provide added protection

Types:
1) Concentric rings
2) Overlapping Redundancy
3) Segregation

25. Security A well-defined boundary between the organization and the outside
perime- ter world. Cyber- security emphasizes the system-centric model (placing
controls at the network level)
26. Internet
Secure access to the Internet for enterprise employees and guest users,
Perime- ter
regard- less of location.

It should...
1) Route traflc between enterprise & internet
2) Prevent executable files from being transferred through email
attach- ments/browsing
3) Monitor internal/external network ports
4) Detect & block traflc from infected internal end point
5) Control user traflc bound for the internet
6) Identify and block malicious packets
7) Eliminate threats such as email spam, viruses
8) Enforce filtering policies to block access to websites containing malwa
9) Provide protection for VPNs, WANs, and WLANs
27. Open Sys-
tems Intercon- a seven-layer architecture for defining how data is transmitted from
computer to computer in a network, from the physical connection to
4/
37

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ElevatedExcellence Exam
Follow You need to be logged in order to follow users or courses
Sold
889
Member since
3 year
Number of followers
504
Documents
17695
Last sold
10 hours ago
GETSOCIO EDUCATION

We have launched our assignments at a very reasonable price so that every student can enjoy its features. Our new method is gathering quite a positive feedback from the students, and many of our alumnus are fully satisfied with it. We would be glad if you purchase from us. THANK YOU!!

3,8

170 reviews

5
76
4
36
3
27
2
10
1
21

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions