Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISACA CSX Fundamentals Certificate Practice Quiz and Answers 2022

Beoordeling
-
Verkocht
-
Pagina's
23
Cijfer
A+
Geüpload op
01-07-2022
Geschreven in
2021/2022

1. To which of the following layers of the Open Systems Interconnect (OSI) model would one map Ethernet? - ANSWER Data Link Network Application Transport (X) 5. Which cybersecurity principle is most important when attempting to trace the source of malicious activity? Availability Integrity Nonrepudiation Confidentiality 6. Which of the following offers the strongest protection for wireless network traffic? Wireless Protected Access 2 (WPA2) Wireless Protected Access-Advanced Encryption Standard (WPA-AES) Wired Equivalent Protection 128-bit (WEP-128) Wireless Protected Access-Temporary Key Integrity Protocol (WPA-TKIP) 7. Outsourcing poses the greatest risk to an organization when it involves: Business support services Technology infrastructure Cybersecurity capabilities Core business functions 8. Risk assessments should be performed: At the start of a program On a regular basis When an asset changes When a vulnerability is discovered 9. Maintaining a high degree of confidence regarding the integrity of evidence requires a(n): Power of attorney Sworn statement Chain of custody Affidavit 10. A firewall that tracks open connection-oriented protocol sessions is said to be: State-sponsored Stateless Stateful Stated 11. During which phase of the system development lifecycle (SDLC) should security first be considered? Planning Analysis Design Implementation 12. A cybersecurity architecture designed around the concept of a perimeter is said to be: Data-centric User-centric Integrated System-centric 13. A passive network hub operates at which layer of the OSI model? Data Link Physical Network Transport 14. Updates in cloud-computing environments can be rolled out quickly because the environment is: Homogeneous Distributed Diversified Secure 15. During which phase of the six-phase incident response model is the root cause determined? Recovery Identification Containment Eradication 16. The attack mechanism directed against a system is commonly called a(n): Exploit Vulnerability Payload Attack Vector 17. Where should an organization's network terminate virtual private network (VPN) tunnels? At an interior router, to reduce network traffic congestion At a dedicated "honey pot" system in the demilitarized zone (DMZ) At the destination system, to prevent loss of confidentiality At the perimeter, to allow for effective internal monitoring 18. In practical applications: Symmetric key encryption is used to securely distribute asymmetric keys Asymmetric key encryption is used to securely obtain symmetric keys Symmetric key encryption is used only for short messages, such as digital signatures Asymmetric key encryption is used in cases where speed is important 19. Which two factors are used to calculate the likelihood of an event? Threat and vulnerability Vulnerability and asset value Asset count and asset value Threat and asset count 20. What is one advantage of a firewall implemented in software over a firewall appliance? Performance Power consumption Flexibility Resiliency 21. A business continuity plan (BCP) is not complete unless it includes: Dedicated resources Detailed procedures Network diagrams Critical processes 22. Under the US-CERT model for incident categorization, a CAT-3 incident refers to which of the following? Improper usage Investigation Denial of service (DoS) Malicious code 23. An interoperability error is what type of vulnerability? Technical Process Emergent Organizational 24. Securing Supervisory Control and Data Acquisition (SCADA) systems can be challenging because they: Operate in specialized environments and often have non-standard design elements Are subject to specialized requirements established for national security systems Support critical infrastructure processes for which any risk of compromise is unacceptable Cannot be replaced due to aging infrastructure and the complexity of included components 25. Virtual systems should be managed using a dedicated virtual local area network (VLAN) because: Network topologies do not always property identify the locations of virtual servers VLAN encryption provides a double layer of protection for virtual system data Insecure protocols could result in a compromise of privileged user credentials Segregation of management traffic and use traffic dramatically improves performance 2. Which of the following interpret requirements and apply them to specific situations? - ANSWER Policies Standards Guidelines Procedures 3. Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of: Available resources Levels of effort Projected costs Business needs - ANSWER 4. A segmented network: Offers defense in depth superior to a concentric-layers model Consists of two or more security zones Maximizes the delay experienced by an attacker Delivers superior performance for internal applications - ANSWER - ANSWER Questions and Answers 1. Choose three. According to the NIST framework, which of the following are considered key functions necessary for the protection of digital assets? A. Encrypt B. Protect C. Investigate D. Recover E. Identify 2. Which element of an incident response plan involves obtaining and preserving evidence? A. Preparation B. Identification C. Containment D. Eradication 3. To which of the following layers of the Open Systems Interconnect (OSI) model would one map Ethernet? A. Data Link B. Network C. Application D. Transport 4. Which of the following interpret requirements and apply them to specific situations? A. Policies B. Standards C. Guidelines D. Procedures 5. Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of: A. Available resources B. Levels of effort C. Projected costs D. Business needs 6. A segmented network: A. Offers defense in depth superior to a concentric-layers model B. Consists of two or more security zones C. Maximizes the delay experienced by an attacker D. Delivers superior performance for internal applications 7. Which cybersecurity principle is most important when attempting to trace the source of malicious activity? A. Availability B. Integrity C. Nonrepudiation D. Confidentiality 8. Which of the following offers the strongest protection for wireless network traffic? A. Wireless Protected Access 2 (WPA2) B. Wireless Protected Access-Advanced Encryption Standard (WPA-AES) C. Wired Equivalent Protection 128-bit (WEP-128) D. Wireless Protected Access-Temporary Key Integrity Protocol (WPA-TKIP) 9. Outsourcing poses the greatest risk to an organization when it involves A. Business support services B. Technology infrastructure C. Cybersecurity capabilities D. Core business functions 10. Risk assessments should be performed A. At the start of a program B. On a regular basis C. When an asset changes D. When a vulnerability is discovered 11. Maintaining a high degree of confidence regarding the integrity of evidence requires a(n): A. Power of attorney B. Sworn statement C. Chain of custody D. Affidavit 12. A firewall that tracks open connection-oriented protocol sessions is said to be: A. State-sponsored B. Stateless C. Stateful D. Stated 13. During which phase of the system development lifecycle (SDLC) should security first be considered?

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

ISACA CSX Fundamentals Certificate
Practice Quiz
1. To which of the following layers of the Open Systems Interconnect (OSI) model would
one map Ethernet? - ANSWER Data Link
Network
Application
Transport (X)




5. Which cybersecurity principle is most important when attempting to trace the source
of malicious activity?
Availability
Integrity
Nonrepudiation
Confidentiality

6. Which of the following offers the strongest protection for wireless network traffic?
Wireless Protected Access 2 (WPA2)
Wireless Protected Access-Advanced Encryption Standard (WPA-AES)
Wired Equivalent Protection 128-bit (WEP-128)
Wireless Protected Access-Temporary Key Integrity Protocol (WPA-TKIP)

7. Outsourcing poses the greatest risk to an organization when it involves:
Business support services
Technology infrastructure
Cybersecurity capabilities
Core business functions

8. Risk assessments should be performed:
At the start of a program
On a regular basis
When an asset changes
When a vulnerability is discovered

9. Maintaining a high degree of confidence regarding the integrity of evidence requires
a(n):
Power of attorney
Sworn statement
Chain of custody
Affidavit

,ISACA CSX Fundamentals Certificate
Practice Quiz
10. A firewall that tracks open connection-oriented protocol sessions is said to be:
State-sponsored
Stateless
Stateful
Stated

11. During which phase of the system development lifecycle (SDLC) should security first
be considered?
Planning
Analysis
Design
Implementation

12. A cybersecurity architecture designed around the concept of a perimeter is said to
be:
Data-centric
User-centric
Integrated
System-centric

13. A passive network hub operates at which layer of the OSI model?
Data Link
Physical
Network
Transport

14. Updates in cloud-computing environments can be rolled out quickly because the
environment is:
Homogeneous
Distributed
Diversified
Secure

15. During which phase of the six-phase incident response model is the root cause
determined?
Recovery
Identification
Containment
Eradication

16. The attack mechanism directed against a system is commonly called a(n):
Exploit
Vulnerability
Payload

, ISACA CSX Fundamentals Certificate
Practice Quiz
Attack Vector

17. Where should an organization's network terminate virtual private network (VPN)
tunnels?
At an interior router, to reduce network traffic congestion
At a dedicated "honey pot" system in the demilitarized zone (DMZ)
At the destination system, to prevent loss of confidentiality
At the perimeter, to allow for effective internal monitoring

18. In practical applications:
Symmetric key encryption is used to securely distribute asymmetric keys
Asymmetric key encryption is used to securely obtain symmetric keys
Symmetric key encryption is used only for short messages, such as digital signatures
Asymmetric key encryption is used in cases where speed is important

19. Which two factors are used to calculate the likelihood of an event?
Threat and vulnerability
Vulnerability and asset value
Asset count and asset value
Threat and asset count

20. What is one advantage of a firewall implemented in software over a firewall
appliance?
Performance
Power consumption
Flexibility
Resiliency

21. A business continuity plan (BCP) is not complete unless it includes:
Dedicated resources
Detailed procedures
Network diagrams
Critical processes

22. Under the US-CERT model for incident categorization, a CAT-3 incident refers to
which of the following?
Improper usage
Investigation
Denial of service (DoS)
Malicious code

23. An interoperability error is what type of vulnerability?
Technical
Process

Geschreven voor

Vak

Documentinformatie

Geüpload op
1 juli 2022
Aantal pagina's
23
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.89
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
millyphilip West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2927
Lid sinds
4 jaar
Aantal volgers
1958
Documenten
44632
Laatst verkocht
5 dagen geleden
white orchid store

EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

3.6

552 beoordelingen

5
240
4
87
3
104
2
32
1
89

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen