100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISACA Cybersecurity UPDATED Exam Questions and CORRECT Answers

Beoordeling
-
Verkocht
-
Pagina's
23
Cijfer
A+
Geüpload op
26-07-2025
Geschreven in
2024/2025

ISACA Cybersecurity UPDATED Exam Questions and CORRECT Answers Write blocker - CORRECT ANSWER A device that allows the acquisition of information on a drive without creating the possibility of accidentally damaging the drive WPA3 - CORRECT ANSWER Wireless security protocol released mid-2018 that improves on WPA2 by eliminating preshared key (PSK), which is susceptible to dictionary attacks WPA2 - CORRECT ANSWER Wireless security protocol that supports 802.11i encryption standards to provide greater security. This protocol uses advanced encryption standards (AES) and temporal key integrity protocol (TKIP) for stronger encryption.

Meer zien Lees minder
Instelling
ISACA










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Geüpload op
26 juli 2025
Aantal pagina's
23
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Voorbeeld van de inhoud

ISACA Cybersecurity UPDATED Exam
Questions and CORRECT Answers
Write blocker - CORRECT ANSWER A device that allows the acquisition of information on
a drive without creating the possibility of accidentally damaging the drive


WPA3 - CORRECT ANSWER Wireless security protocol released mid-2018 that improves
on WPA2 by eliminating preshared key (PSK), which is susceptible to dictionary attacks


WPA2 - CORRECT ANSWER Wireless security protocol that supports 802.11i encryption
standards to provide greater security. This protocol uses advanced encryption standards (AES)
and temporal key integrity protocol (TKIP) for stronger encryption.


Worm - CORRECT ANSWER A programmed network attack in which a self- replicating
program does not attach itself to programs, but rather spreads independently of users' action.


Wireless local area network (WLAN) - CORRECT ANSWER Wireless communication
network that serves several users within a specified limited geographic area


Wide area network (WAN) - CORRECT ANSWER A computer network connecting multiple
offices or buildings over a larger area.


Wi-Fi Protected Access (WPA) - CORRECT ANSWER A class of security protocols used to
secure wireless (Wi-Fi) computer networks


Web server - CORRECT ANSWER End-point hardware or software that serves web pages to
users


Vulnerability scanning - CORRECT ANSWER An automated process to proactively identify
security weaknesses in a network or individual system

,Vulnerability analysis - CORRECT ANSWER A process of identifying and classifying
vulnerabilities


Volatile data - CORRECT ANSWER Data that changes frequently and can be lost when the
system's power is shut down


Voice-over Internet Protocol (VoIP) - CORRECT ANSWER Also called IP Telephony,
Internet Telephony and Broadband Phone, a technology that makes it possible to have a voice
conversation over the Internet or over any dedicated Internet Protocol (IP) network instead of
over dedicated voice transmission lines.


Virus signature - CORRECT ANSWER The file of virus patterns that are compared with
existing files to determine whether they are infected with a virus or worm.


Virus - CORRECT ANSWER Piece of code that can replicate itself and spread from one
computer to another. It requires intervention or execution to replicate and/or cause damage. See
Bomb, Trojan horse and worm.


Virtualization - CORRECT ANSWER The process of adding a "guest application" and data
onto a "virtual server," recognizing that the guest application will ultimately part company from
this physical server.


Virtual local area network (VLAN) - CORRECT ANSWER Logical segmentation of a LAN
into different broadcast domains. Scope Notes: A VLAN is set up by configuring ports on a
switch, so devices attached to these ports may communicate as if they were attached to the same
physical network segment, although the devices are located on different LAN segments. A
VLAN is based on logical rather than physical connections.


Vertical defense-in depth - CORRECT ANSWER Controls are placed at different system
layers—hardware, operating system, application, database or user levels


User provisioning - CORRECT ANSWER A process to create, modify, disable and delete
user accounts and their profiles across IT infrastructure and business applications

, User mode - CORRECT ANSWER Used for the execution of normal system activities



User Datagram Protocol (UDP) - CORRECT ANSWER A connectionless Internet protocol
that is designed for network efficiency and speed at the expense of reliability


Uniform resource locator (URL) - CORRECT ANSWER The string of characters that form a
web address


Tunnel mode - CORRECT ANSWER Used to protect traffic between different networks
when traffic must travel through intermediate or untrusted networks. Tunnel mode encapsulates
the entire IP packet with and AH or ESP header and an additional IP header.


Tunnel - CORRECT ANSWER The paths that the encapsulated packets follow in an Internet
virtual private network (VPN).


Triple DES (3DES) - CORRECT ANSWER A block cipher created from the Data Encryption
Standard (DES) cipher by using it three times. 3DES was broken in 2016.


Transport Layer Security (TLS) - CORRECT ANSWER A cryptographic protocol that
provides secure communications, endpoint security and privacy on the Internet


Transmission Control Protocol Internet Protocol (TCP/IP) - CORRECT ANSWER Provides
the basis for the Internet; a set of communication protocols that encompass media access, packet
transport, session communication, file transfer, electronic mail (email), terminal emulation,
remote file access and network management.


Transmission Control Protocol (TCP) - CORRECT ANSWER A connection- based Internet
protocol that supports reliable data transfer connections. Scope Notes: Packet data are verified
using checksums and retransmitted if they are missing or corrupted. The application plays no
part in validating the transfer.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
MGRADES Stanford University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1063
Lid sinds
1 jaar
Aantal volgers
102
Documenten
68976
Laatst verkocht
1 dag geleden
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3,8

168 beoordelingen

5
73
4
30
3
43
2
8
1
14

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen