100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

iSACA Cybersecurity Fundamentals Certification Exam Questions With Correct Answers Already Passed!!

Beoordeling
-
Verkocht
-
Pagina's
37
Cijfer
A+
Geüpload op
13-09-2025
Geschreven in
2025/2026

iSACA Cybersecurity Fundamentals Certification Exam Questions With Correct Answers Already Passed!!

Instelling
ISACA











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Geüpload op
13 september 2025
Aantal pagina's
37
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

iSACA Cybersecurity Fundamentals Certification Exam Question
With Cor
rect Answers Already
Passed!!
1. Confidentiality Protection from unauthorized access

2. integrity Protection from unauthorized modification

3. Availability protection from disruptions in access

4. Cybersecurity the protection of information assets (digital assets) by addressing threats t
information processed, stored, and transported by internetworked informati
systems

5. NIST IPDRR
Functions to
Protect Digital 1) Identify
Assets 2) Protect
3) Detect
4) Respond
5) Recover

6. Nonrepudiation Def: ensuring that a message or other piece of information is genuine

Examples: digital signatures and transaction logs

7. Risk combination of the probability of an event and its consequences, mitigated
through controls

8. Threat Anything that is capable of acting against an asset in a harmful manner

9. Asset something of either tangible or intangible value that is worth protecting

10. Vulnerability A weakness in the design, implementation, operation or internal control of
process that could expose the system to adverse threats from threat events

11. Inherent risk


1/
37

, iSACA Cybersecurity Fundamentals Certification Exam Question
With Cor
rect Answers Already
Passed!!
The risk level or exposure without taking into account the actions that
manage- ment has taken or might take (e.g., implementing controls)

12. Residual risk the risk that remains after management implements internal controls or
some
other response to risk

13. Likelihood A.K.A probability

measure of frequency of which an event may occur, which depends on the
threat and vulnerability

14. Approaches Dependent on:
to 1) Risk tolerance
Cybersecuri
2) Size & scope of the environment
ty Risk
3) Amount of data available

Approaches:
1) Ad hoc
2) Compliance-based
3) Risk-based

15. Threat Agents The actors causing the threats that might exploit a vulnerability

Types:
1) Corporations - competitive advantage
2) Cybercriminals - profit
3) Cyberterrorists - critical infrastructures/government
4) Cyberwarriors - politically motivated
5) Employees - revenge
6) Hacktivists - politically motivated
7) Nation states - government/private entities

2/
37

, iSACA Cybersecurity Fundamentals Certification Exam Question
With Cor
rect Answers Already
Passed!!
8) Online social hackers - identity theft, profit
9) Script kiddies - learning to hack

16. Attack vector The path or route used to gain access to the target (asset)

Types:
1) Ingress - intrusion
2) Egress - Data removal

17. Attack Attributes 1) Attack Vector
2) Payload
3) Exploit
4) Vulnerability
5) Target (Asset)

18. Threat Process 1) Perform reconnaissance (gathering information)
2) Create attack tools
3) Deliver malicious capabilities
4) Exploit and compromise
5) Conduct an attack
6) Achieve results
7) Maintain a presence or set of capabilities
8) Coordinate a campaign

19. Malware Def: software designed to infiltrate or damage a computer system without
the
user's informed consent

Examples: Viruses, network worms, Trojan horses

20. Policies communicate required and prohibited activities and behaviors

21. Standards Interpret policies in specific situations

3/
37

, iSACA Cybersecurity Fundamentals Certification Exam Question
With Cor
rect Answers Already
Passed!!
22. Procedures Provide details on how to comply with policies and standards

23. Guidelines Provide general guidance on issues; not requirements but strongly
recommended

24. Defense in Depth Layering defenses to provide added protection

Types:
1) Concentric rings
2) Overlapping Redundancy
3) Segregation

25. Security A well-defined boundary between the organization and the outside
perime- ter world. Cyber- security emphasizes the system-centric model (placing
controls at the network level)
26. Internet
Secure access to the Internet for enterprise employees and guest users,
Perime- ter
regard- less of location.

It should...
1) Route traflc between enterprise & internet
2) Prevent executable files from being transferred through email
attach- ments/browsing
3) Monitor internal/external network ports
4) Detect & block traflc from infected internal end point
5) Control user traflc bound for the internet
6) Identify and block malicious packets
7) Eliminate threats such as email spam, viruses
8) Enforce filtering policies to block access to websites containing malwa
9) Provide protection for VPNs, WANs, and WLANs
27. Open Sys-
tems Intercon- a seven-layer architecture for defining how data is transmitted from
computer to computer in a network, from the physical connection to
4/
37

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
ElevatedExcellence Exam
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
890
Lid sinds
3 jaar
Aantal volgers
504
Documenten
17639
Laatst verkocht
2 weken geleden
GETSOCIO EDUCATION

We have launched our assignments at a very reasonable price so that every student can enjoy its features. Our new method is gathering quite a positive feedback from the students, and many of our alumnus are fully satisfied with it. We would be glad if you purchase from us. THANK YOU!!

3,8

170 beoordelingen

5
76
4
36
3
27
2
10
1
21

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen