ISACA Cybersecurity Fundamentals practice quiz Flashcards
Who has the greatest influence over access security in a password authentication environment?
A. System administrators
B. Business executives
C. Users
D. Security managers
C. Users
Which of the following interpret requirements and apply them to specific situations?
A. Policies
B. Standards
C. Guidelines
D. Procedures
B. Standards
Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:
A. Available resources
B. Levels of effort
C. Projected costs
D. Business needs
D. Business needs
A segmented network:
A. Offers defense in depth superior to a concentric-layers model
B. Consists of two or more security zones
C. Maximizes the delay experienced by an attacker
D. Delivers superior performance for internal applications
B. Consists of two or more security zones
Which cybersecurity principle is most important when attempting to trace the source of malicious activity?
A. Availability
B. Integrity
C. Nonrepudiation
D. Confidentiality
C. Nonrepudiation
Which of the following offers the strongest protection for wireless network traffic?
A. Wireless Protected Access 2 (WPA2)
B. Wireless Protected Access-Advanced Encryption Standard (WPA-AES)
C. Wired Equivalent Protection 128-bit (WEP-128)
D. Wireless Protected Access-Temporary Key Integrity Protocol (WPA-TKIP)
A. Wireless Protected Access 2 (WPA2)
Outsourcing poses the greatest risk to an organization when it involves:
A. Business support services
B. Technology infrastructure
C. Cybersecurity capabilities
D. Core business functions
D. Core business functions
Risk assessments should be performed:
A. At the start of a program
B. On a regular basis
C. When an asset changes
D. When a vulnerability is discovered
B. On a regular basis
Maintaining a high degree of confidence regarding the integrity of evidence requires a(n):
A. Power of attorney
B. Sworn statement
C. Chain of custody
D. Affidavit
C. Chain of custody
A firewall that tracks open connection-oriented protocol sessions is said to be:
A. State-sponsored
B. Stateless
C. Stateful
D. Stated
C. Stateful
During which phase of the system development lifecycle (SDLC) should security first be considered?
A. Planning
B. Analysis
C. Design
D. Implementation
A. Planning
A cybersecurity architecture designed around the concept of a perimeter is said to be:
A. Data-centric
B. User-centric
C. Integrated
D. System-centric
D. System-centric
A passive network hub operates at which layer of the OSI model?
A. Data Link
B. Physical
C. Network
D. Transport
B. Physical
Updates in cloud-computing environments can be rolled out quickly because the environment is:
A. Homogeneous
B. Distributed
C. Diversified
D. Secure
A. Homogeneous
During which phase of the six-phase incident response model is the root cause determined?
A. Recovery
B. Identification
C. Containment
D. Eradication
D. Eradication