CSX F
CSX F
CSX-F
Cyber Security Fundamentals
QUESTION & ANSWERS
https://www.certificationsprep.com/CSX-F-exam-questions.html
QUESTION 1
Integrity
A. Protection from unauthorized access. One of the three governing principles of cyber security
B. A piece of malware that gains access to a targeted system by hiding within a genuine application.
C. Hides malicious processes to prevent detection, modifies the underlying operating system
D. Protection from unauthorized modification. One of the three governing principles of cyber security
Correct Answer: D
QUESTION 2
Correct Answer: C
QUESTION 3
Which of the following cybersecurity roles is charged with the duty of managing incidents and
remediation?
A. Board of directors
B. Executive committee
C. Cybersecurity management
D. Cybersecurity practitioners
Correct Answer: C
QUESTION 4
Backdoor
A. A means of regaining access to a compromised system by installing software or configuring
existing software to enable remote access under attacker defined conditions
https://www.certificationsprep.com/CSX-F-exam-questions.html
B. A large automated and distributed network previously compromised computers that can be
simultaneously controlled to launch large-scale attacks such as denial of service
C. When a program or process tries to store more data in a buffer (temporary data storage area)
than it was intended to hold
D. Something of either tangible or intangible value that is worth protecting, including people,
information, infrastructure, finances and reputation
Correct Answer: A
QUESTION 5
Asset
A. Something of either tangible or intangible value that is worth protecting, including people,
information, infrastructure, finances and reputation
B. A large automated and distributed network previously compromised computers that can be
simultaneously controlled to launch large-scale attacks such as denial of service
C. Anything that is capable of acting against an asset in a manner that can result in harm
D. A means of regaining access to a compromised system by installing software or configuring
existing software to enable remote access under attacker defined conditions.
Correct Answer: A
QUESTION 6
Correct Answer: B
QUESTION 7
Phishing
A. An attack where social engineering techniques are used to masquerade as a trusted party to
obtain important information such as passwords from the victim
https://www.certificationsprep.com/CSX-F-exam-questions.html
B. An assault on the service from a single source that floods it with so many request that it becomes
overwhelmed and is either stopped completely or operates at a significantly reduced rate.
C. A type of electronic mail attack that attempts to convince the user that the originator is genuine,
but with the intention of obtaining information for use in social engineering.
D. Attack strategy in which the attacker intersects the communication stream between two parts of
the victim system and then replaces the traffic between the two components with the intruders
own, eventually assuming control of the communication
Correct Answer: C
https://www.certificationsprep.com/CSX-F-exam-questions.html