0% found this document useful (0 votes)
192 views4 pages

CSX F

This document contains 7 multiple choice questions from the CSX-F cybersecurity fundamentals exam. The questions cover topics like integrity, keyloggers, roles in cybersecurity management, backdoors, assets, ransomware, and phishing. For each question there are 4 potential answers and only one correct answer is identified. The questions test knowledge of basic cybersecurity concepts and terminology.

Uploaded by

Carlos sanchez
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
192 views4 pages

CSX F

This document contains 7 multiple choice questions from the CSX-F cybersecurity fundamentals exam. The questions cover topics like integrity, keyloggers, roles in cybersecurity management, backdoors, assets, ransomware, and phishing. For each question there are 4 potential answers and only one correct answer is identified. The questions test knowledge of basic cybersecurity concepts and terminology.

Uploaded by

Carlos sanchez
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 4

Isaca

CSX-F
Cyber Security Fundamentals
QUESTION & ANSWERS

https://www.certificationsprep.com/CSX-F-exam-questions.html
QUESTION 1

Integrity
A. Protection from unauthorized access. One of the three governing principles of cyber security
B. A piece of malware that gains access to a targeted system by hiding within a genuine application.
C. Hides malicious processes to prevent detection, modifies the underlying operating system
D. Protection from unauthorized modification. One of the three governing principles of cyber security

Correct Answer: D

QUESTION 2

Secretly records user keystrokes and, in some cases, screen content.


A. Integrity
B. Ransomware
C. Keylogger
D. Payload

Correct Answer: C

QUESTION 3

Which of the following cybersecurity roles is charged with the duty of managing incidents and
remediation?
A. Board of directors
B. Executive committee
C. Cybersecurity management
D. Cybersecurity practitioners

Correct Answer: C

QUESTION 4

Backdoor
A. A means of regaining access to a compromised system by installing software or configuring
existing software to enable remote access under attacker defined conditions

https://www.certificationsprep.com/CSX-F-exam-questions.html
B. A large automated and distributed network previously compromised computers that can be
simultaneously controlled to launch large-scale attacks such as denial of service
C. When a program or process tries to store more data in a buffer (temporary data storage area)
than it was intended to hold
D. Something of either tangible or intangible value that is worth protecting, including people,
information, infrastructure, finances and reputation

Correct Answer: A

QUESTION 5

Asset
A. Something of either tangible or intangible value that is worth protecting, including people,
information, infrastructure, finances and reputation
B. A large automated and distributed network previously compromised computers that can be
simultaneously controlled to launch large-scale attacks such as denial of service
C. Anything that is capable of acting against an asset in a manner that can result in harm
D. A means of regaining access to a compromised system by installing software or configuring
existing software to enable remote access under attacker defined conditions.

Correct Answer: A

QUESTION 6

Locks or encrypts data or functions and demands a payment to unlock them.


A. Residual Risk
B. Ransomware
C. Authorization
D. Key logger

Correct Answer: B

QUESTION 7

Phishing
A. An attack where social engineering techniques are used to masquerade as a trusted party to
obtain important information such as passwords from the victim

https://www.certificationsprep.com/CSX-F-exam-questions.html
B. An assault on the service from a single source that floods it with so many request that it becomes
overwhelmed and is either stopped completely or operates at a significantly reduced rate.
C. A type of electronic mail attack that attempts to convince the user that the originator is genuine,
but with the intention of obtaining information for use in social engineering.
D. Attack strategy in which the attacker intersects the communication stream between two parts of
the victim system and then replaces the traffic between the two components with the intruders
own, eventually assuming control of the communication

Correct Answer: C

https://www.certificationsprep.com/CSX-F-exam-questions.html

You might also like