100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

ISACA Cyber Security Fundamentals - Intro to Cyber Security Objectives Questions with Accurate Answers

Puntuación
-
Vendido
-
Páginas
47
Grado
A+
Subido en
24-07-2025
Escrito en
2024/2025

_____________ key systems use pairs of unidirectional complementary keys that only encrypt or decrypt. correct answer asymmetric ______________ key systems use single secret bidirectional keys that encrypt and decrypt. correct answer symmetric - Mitigation - Analysis - Communications are activities associated with correct answer RESPONDING to attacks on digital assets -Access Control Awareness / Training -Data Security -Info Protection, Processes and Procedures are activities associated with........ correct answer PROTECTING digital assets -Anomalies and Events -Security Continuous Monitoring -Detection Processes are activities associated with................ correct answer DETECTING attacks on digital assets

Mostrar más Leer menos
Institución
Cybersecurity For Technical Staff
Grado
Cybersecurity for Technical Staff











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Cybersecurity for Technical Staff
Grado
Cybersecurity for Technical Staff

Información del documento

Subido en
24 de julio de 2025
Número de páginas
47
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

ISACA Cyber Security Fundamentals -
Intro to Cyber Security Objectives
Questions with Accurate Answers
_____________ key systems use pairs of unidirectional complementary keys that
only encrypt or decrypt. correct answer asymmetric


______________ key systems use single secret bidirectional keys that encrypt and
decrypt. correct answer symmetric


- Mitigation
- Analysis
- Communications
are activities associated with correct answer RESPONDING to attacks on digital
assets


-Access Control
Awareness / Training
-Data Security
-Info Protection, Processes and Procedures
are activities associated with........ correct answer PROTECTING digital assets


-Anomalies and Events
-Security Continuous Monitoring
-Detection Processes

,are activities associated with................ correct answer DETECTING attacks on
digital assets


-Asset management
-Business environment
-Governance
-Risk assessment
-Risk Management
are activities associated with......... correct answer IDENTIFYING digital assets


-Recovery Planning
-Communications
-Continuous Improvements
are activities associated with....... correct answer RECOVERING from attacks on
digital assets


5 key functions for protection of digital assets correct answer 1. Identify,
2. Protect,
3. Detect,
4. Respond,
5. Recover


A business impact anaysis (BIA) provides the basis for which of the following:
Service delivery objectives
Maximum tolerable outages

,RPO
RTO correct answer all


A collection of threats is generally referred to as an:
- cyberwarefare
- advanced persistent threat (APT)
- Hacktivism
- Threat environment correct answer - Threat environment


A dynamic packet filtering firewall that tracks the IP address of each packet to
provide controls over the flow of IP traffic. Efficient but complex. correct answer
Stateful inspection firewall


A firewall that has two or more network interfaces, each connected to a different
network. Blocks and filters network traffic. correct answer A dual homed firewall.


A key limitation of anti malware is that it:
is not generally effective for known threats
-is not scalable as internet usage grows
-is complex to administer
-is generally not effective for malicious code yet to be identified correct answer -
is generally not effective for malicious code yet to be identified


A major incident which has grown out of control and increased in severity is
called:
Crisis

, Emergency
Incident
Event correct answer Crisis


A packet filtering router and bastion host together makes what kind of firewall
correct answer Screened host firewall.


A screening router that examines the header of every packet of data traveling
between the internet and the network. The router can then prevent certain
packets from being sent. correct answer Packet filtering firewall


A stateful inspection firewall is also known as:
DMZ
dual homed firewall
screened host firewall
dynamic packet filtering correct answer dynamic packet filtering


A weakness in the design, implementation, operation or internal control of a
process that could expose the system to adverse threats is called:
Risk
Asset
Threat
Vulnerability correct answer Vulnerability


A well defined boundary between the orgainzation and the outside world (even if
virtual) correct answer Security Perimeter
$17.29
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
starwid Yale University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
13
Miembro desde
7 meses
Número de seguidores
1
Documentos
8640
Última venta
1 mes hace

3.3

4 reseñas

5
1
4
0
3
2
2
1
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes