ISACA Cybersecurity Exam questions
with complete solutions 2024
A jpolicy jthat jestablishes jan jagreement jbetween jusers jand jthe jenterprise jand
jdefines jfor jall jparties' jthe jranges jof juse jthat jare japproved jbefore jgaining
jaccess jto ja jnetwork jor jthe jInternet. j- jANS✓✓-Acceptable jUse jpolicy
An jinternal jcomputerized jtable jof jaccess jrules jregarding jthe jlevels jof jcomputer
jaccess jpermitted jto jlogon jIDs jand jcomputer jterminals. jScope jNotes: jAlso
jreferred jto jas jaccess jcontrol jtables. j- jANS✓✓-Access jcontrol jlist j(ACL)
The jpermission jor jprivileges jgranted jto jusers, jprograms jor jworkstations jto
jcreate, jchange, jdelete jor jview jdata jand jfiles jwithin ja jsystem, jas jdefined jby
jrules jestablished jby jdata jowners jand jthe jinformation jsecurity jpolicy. j-
jANS✓✓-Access jrights
The jability jto jmap ja jgiven jactivity jor jevent jback jto jthe jresponsible jparty. j-
jANS✓✓-Accountability
A jpublic jalgorithm jthat jsupports jkeys jfrom j128 jbits jto j256 jbits jin jsize j-
jANS✓✓-Advanced jEncryption jStandard j(AES)
An jadversary jthat jpossesses jsophisticated jlevels jof jexpertise jand jsignificant
jresources jthat jallow jit jto jcreate jopportunities jto jachieve jits jobjectives jby
jusing jmultiple jattack jvectors, jincluding jcyber, jphysical jand jdeception.
jTypically, jAPT jobjectives jinclude jestablishing jand jextending jfootholds jwithin
jthe jIT jinfrastructure jof jthe jtargeted jorganizations jfor jpurposes jof jexfiltrating
jinformation, jor jundermining jor jimpeding jcritical jaspects jof ja jmission, jprogram
jor jorganization; jor jpositioning jitself jto jcarry jout jthose jobjectives jin jthe jfuture.
jThe jadvanced jpersistent jthreat jpursues jits jobjectives jrepeatedly, jover jan
jextended jperiod, jadapts jto jdefenders' jefforts jto jresist jit jand jis jdetermined jto
jmaintain jthe jlevel jof jinteraction jthat jis jneeded jto jexecute jits jobjectives.
jSource: jNIST jSP j800-39 j- jANS✓✓-Advanced jpersistent jthreat j(APT)
A jthreat jagent j- jANS✓✓-Adversary
A jsoftware jpackage jthat jautomatically jplays, jdisplays jor jdownloads jadvertising
jmaterial jto ja jcomputer jafter jthe jsoftware jis jinstalled jon jit jor jwhile jthe
,j
japplication jis jbeing jused. jScope jNotes: jIn jmost jcases, jthis jis jdone jwithout
jany jnotification jto jthe juser jor jwithout jthe juser's jconsent. jThe jterm jadware
jmay jalso jrefer jto jsoftware jthat jdisplays jadvertisements, jwhether jor jnot jit jdoes
jso jwith jthe juser's jconsent; jsuch jprograms jdisplay jadvertisements jas jan
jalternative jto jshareware jregistration jfees. jThese jare jclassified jas jadware jin jthe
jsense jof jadvertising jsupported jsoftware, jbut jnot jas jspyware. jAdware jin jthis
jform jdoes jnot joperate jsurreptitiously jor jmislead jthe juser, jand jit jprovides jthe
juser jwith ja jspecific jservice. j- jANS✓✓-Adware
A jtransmission jsignal jthat jvaries jcontinuously jin jamplitude jand jtime jand jis
jgenerated jin jwave jformation. jScope jNotes: jAnalog jsignals jare jused jin
jtelecommunications j- jANS✓✓-Analog
A jmeans jof jregaining jaccess jto ja jcompromised jsystem jby jinstalling jsoftware
jor jconfiguring jexisting jsoftware jto jenable jremote jaccess junder jattacker-
defined jconditions j- jANS✓✓-Back jdoor
The jrange jbetween jthe jhighest jand jlowest jtransmittable jfrequencies. jIt jequates
jto jthe jtransmission jcapacity jof jan jelectronic jline jand jis jexpressed jin jbytes jper
jsecond jor jHertz j(cycles jper jsecond). j- jANS✓✓-Bandwidth
System jheavily jfortified jagainst jattacks j- jANS✓✓-Bastion
A jsecurity jtechnique jthat jverifies jan jindividual's jidentity jby janalyzing ja junique
jphysical jattribute, jsuch jas ja jhandprint. j- jANS✓✓-Biometrics
A jpublic jalgorithm jthat joperates jon jplaintext jin jblocks j(strings jor jgroups) jof
jbits j- jANS✓✓-Block jcipher
A jterm jderived jfrom j"robot jnetwork;" jis ja jlarge jautomated jand jdistributed
jnetwork jof jpreviously jcompromised jcomputers jthat jcan jbe jsimultaneously
jcontrolled jto jlaunch jlargescale jattacks jsuch jas ja jdenial- jof-service jattack jon
jselected jvictims j- jANS✓✓-Botnet
Logical jand jphysical jcontrols jto jdefine ja jperimeter jbetween jthe jorganization
jand jthe joutside jworld j- jANS✓✓-Boundary
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller tuition. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.