100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ISACA Cybersecurity Exam questions with complete solutions 2024. $11.49   Add to cart

Exam (elaborations)

ISACA Cybersecurity Exam questions with complete solutions 2024.

 1 view  0 purchase
  • Course
  • Institution

ISACA Cybersecurity Exam questions with complete solutions 2024.

Preview 3 out of 28  pages

  • November 20, 2024
  • 28
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
j




ISACA Cybersecurity Exam questions
with complete solutions 2024



A jpolicy jthat jestablishes jan jagreement jbetween jusers jand jthe jenterprise jand
jdefines jfor jall jparties' jthe jranges jof juse jthat jare japproved jbefore jgaining
jaccess jto ja jnetwork jor jthe jInternet. j- jANS✓✓-Acceptable jUse jpolicy


An jinternal jcomputerized jtable jof jaccess jrules jregarding jthe jlevels jof jcomputer
jaccess jpermitted jto jlogon jIDs jand jcomputer jterminals. jScope jNotes: jAlso
jreferred jto jas jaccess jcontrol jtables. j- jANS✓✓-Access jcontrol jlist j(ACL)


The jpermission jor jprivileges jgranted jto jusers, jprograms jor jworkstations jto
jcreate, jchange, jdelete jor jview jdata jand jfiles jwithin ja jsystem, jas jdefined jby
jrules jestablished jby jdata jowners jand jthe jinformation jsecurity jpolicy. j-
jANS✓✓-Access jrights


The jability jto jmap ja jgiven jactivity jor jevent jback jto jthe jresponsible jparty. j-
jANS✓✓-Accountability


A jpublic jalgorithm jthat jsupports jkeys jfrom j128 jbits jto j256 jbits jin jsize j-
jANS✓✓-Advanced jEncryption jStandard j(AES)


An jadversary jthat jpossesses jsophisticated jlevels jof jexpertise jand jsignificant
jresources jthat jallow jit jto jcreate jopportunities jto jachieve jits jobjectives jby
jusing jmultiple jattack jvectors, jincluding jcyber, jphysical jand jdeception.
jTypically, jAPT jobjectives jinclude jestablishing jand jextending jfootholds jwithin
jthe jIT jinfrastructure jof jthe jtargeted jorganizations jfor jpurposes jof jexfiltrating
jinformation, jor jundermining jor jimpeding jcritical jaspects jof ja jmission, jprogram
jor jorganization; jor jpositioning jitself jto jcarry jout jthose jobjectives jin jthe jfuture.
jThe jadvanced jpersistent jthreat jpursues jits jobjectives jrepeatedly, jover jan
jextended jperiod, jadapts jto jdefenders' jefforts jto jresist jit jand jis jdetermined jto
jmaintain jthe jlevel jof jinteraction jthat jis jneeded jto jexecute jits jobjectives.
jSource: jNIST jSP j800-39 j- jANS✓✓-Advanced jpersistent jthreat j(APT)


A jthreat jagent j- jANS✓✓-Adversary

A jsoftware jpackage jthat jautomatically jplays, jdisplays jor jdownloads jadvertising
jmaterial jto ja jcomputer jafter jthe jsoftware jis jinstalled jon jit jor jwhile jthe

,j




japplication jis jbeing jused. jScope jNotes: jIn jmost jcases, jthis jis jdone jwithout
jany jnotification jto jthe juser jor jwithout jthe juser's jconsent. jThe jterm jadware
jmay jalso jrefer jto jsoftware jthat jdisplays jadvertisements, jwhether jor jnot jit jdoes
jso jwith jthe juser's jconsent; jsuch jprograms jdisplay jadvertisements jas jan
jalternative jto jshareware jregistration jfees. jThese jare jclassified jas jadware jin jthe
jsense jof jadvertising jsupported jsoftware, jbut jnot jas jspyware. jAdware jin jthis
jform jdoes jnot joperate jsurreptitiously jor jmislead jthe juser, jand jit jprovides jthe
juser jwith ja jspecific jservice. j- jANS✓✓-Adware


A jtransmission jsignal jthat jvaries jcontinuously jin jamplitude jand jtime jand jis
jgenerated jin jwave jformation. jScope jNotes: jAnalog jsignals jare jused jin
jtelecommunications j- jANS✓✓-Analog


A jwidely jused jtechnology jto jprevent, jdetect jand jremove jmany jcategories jof
jmalware, jincluding jcomputer jviruses, jworms, jTrojans, jkeyloggers, jmalicious
jbrowser jplug-ins, jadware jand jspyware j- jANS✓✓-Antimalware


An japplication jsoftware jdeployed jat jmultiple jpoints jin jan jIT jarchitecture. jIt jis
jdesigned jto jdetect jand jpotentially jeliminate jvirus jcode jbefore jdamage jis jdone
jand jrepair jor jquarantine jfiles jthat jhave jalready jbeen jinfected. j- jANS✓✓-
Antivirus jsoftware

In jthe jOpen jSystems jInterconnection j(OSI) jcommunications jmodel, jthe
japplication jlayer jprovides jservices jfor jan japplication jprogram jto jensure jthat
jeffective jcommunication jwith janother japplication jprogram jin ja jnetwork jis
jpossible. j- jANS✓✓-Application jlayer


Description jof jthe jfundamental junderlying jdesign jof jthe jcomponents jof jthe
jbusiness jsystem, jor jof jone jelement jof jthe jbusiness jsystem j(e.g., jtechnology),
jthe jrelationships jamong jthem, jand jthe jmanner jin jwhich jthey jsupport
jenterprise jobjectives. j- jANS✓✓-Architecture


Something jof jeither jtangible jor jintangible jvalue jthat jis jworth jprotecting,
jincluding jpeople, jinformation, jinfrastructure, jfinances jand jreputation. j-
jANS✓✓-Asset


A jcipher jtechnique jin jwhich jdifferent jcryptographic jkeys jare jused jto jencrypt
jand jdecrypt ja jmessage. jScope jNotes: jSee jpublic jkey jencryption. j- jANS✓✓-
Asymmetric jkey j(public jkey)

An jactual joccurrence jof jan jadverse jevent j- jANS✓✓-Attack

A jmethod jused jto jdeliver jthe jexploit. jUnless jthe jattacker jis jpersonally
jperforming jthe jattack, jan jattack jmechanism jmay jinvolve ja jpayload, jor
jcontainer, jthat jdelivers jthe jexploit jto jthe jtarget. j- jANS✓✓-Attack jmechanism

, j




A jpath jor jroute jused jby jthe jadversary jto jgain jaccess jto jthe jtarget j(asset).
jScope jNotes: jThere jare jtwo jtypes jof jattack jvectors: jingress jand jegress j(also
jknown jas jdata jexfiltration) j- jANS✓✓-Attack jvector


Data jin jthe jform jof ja jlogical jpath jlinking ja jsequence jof jevents, jused jto jtrace
jthe jtransactions jthat jhave jaffected jthe jcontents jof ja jrecord. jSource j: jISO j-
jANS✓✓-Audit jtrail


1. jThe jact jof jverifying jidentity, ji.e., juser, jsystem. jScope jNotes: jRisk: jCan jalso
jrefer jto jthe jverification jof jthe jcorrectness jof ja jpiece jof jdata. j2. jThe jact jof
jverifying jthe jidentity jof ja juser, jthe juser's jeligibility jto jaccess jcomputerized
jinformation. jScope jNotes: jAssurance: jAuthentication jis jdesigned jto jprotect
jagainst jfraudulent jlogon jactivity. jIt jcan jalso jrefer jto jthe jverification jof jthe
jcorrectness jof ja jpiece jof jdata. j- jANS✓✓-Authentication


Undisputed jauthorship j- jANS✓✓-Authenticity

Ensuring jtimely jand jreliable jaccess jto jand juse jof jinformation j- jANS✓✓-
Availability

A jmeans jof jregaining jaccess jto ja jcompromised jsystem jby jinstalling jsoftware
jor jconfiguring jexisting jsoftware jto jenable jremote jaccess junder jattacker-
defined jconditions j- jANS✓✓-Back jdoor

The jrange jbetween jthe jhighest jand jlowest jtransmittable jfrequencies. jIt jequates
jto jthe jtransmission jcapacity jof jan jelectronic jline jand jis jexpressed jin jbytes jper
jsecond jor jHertz j(cycles jper jsecond). j- jANS✓✓-Bandwidth


System jheavily jfortified jagainst jattacks j- jANS✓✓-Bastion

A jsecurity jtechnique jthat jverifies jan jindividual's jidentity jby janalyzing ja junique
jphysical jattribute, jsuch jas ja jhandprint. j- jANS✓✓-Biometrics


A jpublic jalgorithm jthat joperates jon jplaintext jin jblocks j(strings jor jgroups) jof
jbits j- jANS✓✓-Block jcipher


A jterm jderived jfrom j"robot jnetwork;" jis ja jlarge jautomated jand jdistributed
jnetwork jof jpreviously jcompromised jcomputers jthat jcan jbe jsimultaneously
jcontrolled jto jlaunch jlargescale jattacks jsuch jas ja jdenial- jof-service jattack jon
jselected jvictims j- jANS✓✓-Botnet


Logical jand jphysical jcontrols jto jdefine ja jperimeter jbetween jthe jorganization
jand jthe joutside jworld j- jANS✓✓-Boundary


An jenterprise jpolicy jused jto jpermit jpartial jor jfull jintegration jof juser-owned
jmobile jdevices jfor jbusiness jpurposes j- jANS✓✓-Bring jyour jown jdevice j(BYOD)

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller tuition. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart