0% found this document useful (0 votes)
289 views7 pages

Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity - ISACA

The document is a practice quiz for the Cybersecurity Fundamentals exam provided by ISACA, aimed at helping individuals prepare for the certification. It includes feedback on the user's performance, highlighting areas where they answered incorrectly and providing the correct answers. The quiz serves as a preview of the types of questions that will be on the official exam, which consists of 75 questions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
289 views7 pages

Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity - ISACA

The document is a practice quiz for the Cybersecurity Fundamentals exam provided by ISACA, aimed at helping individuals prepare for the certification. It includes feedback on the user's performance, highlighting areas where they answered incorrectly and providing the correct answers. The quiz serves as a preview of the types of questions that will be on the official exam, which consists of 75 questions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA

TAKE THE FREE


CYBERSECURITY
FUNDAMENTALS
PRACTICE QUIZ

YO U D I D N ' T PA S S W IT H 9 / 2 5 C O R R E CT,
B U T D O N ’ T G I V E U P — YO U C A N S T I L L E XC E L O N T H E
EXAM.

Great effort! No matter your score, the right preparation from ISACA® can
help you on your Cybersecurity Fundamentals exam and to move your career
forward.

Scroll down for your detailed results.

Remember: these questions are a small preview of what you can expect on exam day.
The official Cybersecurity Fundamentals exam has 75 questions.

You’re just a few steps away from obtaining your Cybersecurity Fundamentals certificate:

1. Prep for your exam.


2. Purchase your exam.
3. Schedule your exam.
4. Ace the exam.

Choose Your Exam Prep

E X P L O R E C Y B E R S E C U R I T Y F U N D A M E N TA L S P R E P

Master the Quickly expand Become better Make the most


material your skillset at your job of exam day

®
TRAINED BY ISACA . CERTIFIED BY ISACA.

https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 1/7
3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA

Who has the greatest influence over access security in a password


authentication environment?

YOUR ANSWER: A. System administrators

CORRECT ANSWER: C. Users

Which of the following interpret requirements and apply them to specific


situations?

YOUR ANSWER: C. Guidelines

CORRECT ANSWER: B. Standards

Business continuity plans (BCPs) associated with organizational information


systems should be developed primarily on the basis of:

YOUR ANSWER: A. Available resources

CORRECT ANSWER: D. Business needs

A segmented network:

YOUR ANSWER: D. Delivers superior performance for internal applications

CORRECT ANSWER: B. Consists of two or more security zones

Which cybersecurity principle is most important when attempting to trace the


source of malicious activity?

YOUR ANSWER: D. Confidentiality

https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 2/7
3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA

CORRECT ANSWER: C. Nonrepudiation

Which of the following offers the strongest protection for wireless network
traffic?

YOUR ANSWER: A. Wireless Protected Access 2 (WPA2)

Outsourcing poses the greatest risk to an organization when it involves:

YOUR ANSWER: C. Cybersecurity capabilities

CORRECT ANSWER: D. Core business functions

Risk assessments should be performed:

YOUR ANSWER: B. On a regular basis

Maintaining a high degree of confidence regarding the integrity of evidence


requires a(n):

YOUR ANSWER: C. Chain of custody

https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 3/7
3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA

10

A firewall that tracks open connection-oriented protocol sessions is said to be:

YOUR ANSWER: C. Stateful

11

During which phase of the system development lifecycle (SDLC) should security
first be considered?

YOUR ANSWER: A. Planning

12

A cybersecurity architecture designed around the concept of a perimeter is said


to be:

YOUR ANSWER: D. System-centric

13

A passive network hub operates at which layer of the OSI model?

YOUR ANSWER: D. Transport

CORRECT ANSWER: B. Physical

14

Updates in cloud-computing environments can be rolled out quickly because the


environment is:

YOUR ANSWER: B. Distributed

https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 4/7
3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA

CORRECT ANSWER: A. Homogeneous

15

During which phase of the six-phase incident response model is the root cause
determined?

YOUR ANSWER: B. Identification

CORRECT ANSWER: D. Eradication

16

The attack mechanism directed against a system is commonly called a(n):

YOUR ANSWER: A. Exploit

CORRECT ANSWER: C. Payload

17

Where should an organization’s network terminate virtual private network (VPN)


tunnels?

YOUR ANSWER: D. At the perimeter, to allow for effective internal monitoring

18

In practical applications:

YOUR ANSWER: A. Symmetric key encryption is used to securely distribute


asymmetric keys

CORRECT ANSWER: B. Asymmetric key encryption is used to securely obtain


symmetric keys

https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 5/7
3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA

19

Which two factors are used to calculate the likelihood of an event?

YOUR ANSWER: A. Threat and vulnerability

20

What kind of anti-malware program evaluates system processes based on their


observed behaviors?

YOUR ANSWER: B. Signature-based

CORRECT ANSWER: A. Heuristic

21

A business continuity plan (BCP) is not complete unless it includes:

YOUR ANSWER: D. Critical processes

CORRECT ANSWER: B. Detailed procedures

22

Under the US-CERT model for incident categorization, a CAT-3 incident refers to
which of the following?

YOUR ANSWER: B. Investigation

CORRECT ANSWER: D. Malicious code

23

An interoperability error is what type of vulnerability?

YOUR ANSWER: C. Emergent

https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 6/7
3/22/25, 6:17 PM Cybersecurity Fundamentals Practice Quiz - Test Your Knowledge of Cybersecurity | ISACA

24

Securing Supervisory Control and Data Acquisition (SCADA) systems can be


challenging because they:

YOUR ANSWER: B. Are subject to specialized requirements established for


national security systems

CORRECT ANSWER: A. Operate in specialized environments and often have non-


standard design elements

25

Virtual systems should be managed using a dedicated virtual local area network
(VLAN) because:

YOUR ANSWER: A. Network topologies do not always property identify the


locations of virtual servers

CORRECT ANSWER: C. Insecure protocols could result in a compromise of

COPYRIGHT ©2021 ISACA privileged user credentials


ISACA.ORG

https://www.isaca.org/-/media/info/csxf-practice-quiz/index.html?utm_source=chatgpt.com 7/7

You might also like