Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity - ISACA
Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity - ISACA
YO U D I D N ' T PA S S W IT H 9 / 2 5 C O R R E CT,
B U T D O N ’ T G I V E U P — YO U C A N S T I L L E XC E L O N T H E
EXAM.
Great effort! No matter your score, the right preparation from ISACA® can
help you on your Cybersecurity Fundamentals exam and to move your career
forward.
Remember: these questions are a small preview of what you can expect on exam day.
The official Cybersecurity Fundamentals exam has 75 questions.
You’re just a few steps away from obtaining your Cybersecurity Fundamentals certificate:
E X P L O R E C Y B E R S E C U R I T Y F U N D A M E N TA L S P R E P
®
TRAINED BY ISACA . CERTIFIED BY ISACA.
https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 1/7
3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA
A segmented network:
https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 2/7
3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA
Which of the following offers the strongest protection for wireless network
traffic?
https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 3/7
3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA
10
11
During which phase of the system development lifecycle (SDLC) should security
first be considered?
12
13
14
https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 4/7
3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA
15
During which phase of the six-phase incident response model is the root cause
determined?
16
17
18
In practical applications:
https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 5/7
3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA
19
20
21
22
Under the US-CERT model for incident categorization, a CAT-3 incident refers to
which of the following?
23
https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 6/7
3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA
24
25
Virtual systems should be managed using a dedicated virtual local area network
(VLAN) because:
https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 7/7