CSX F
CSX F
CSX-F
Cyber Security Fundamentals
https://www.genuinedumps.com/
1. Integrity
A. Protection from unauthorized access. One of the three governing principles of cyber
security
B. A piece of malware that gains access to a targeted system by hiding within a genuine
application.
C. Hides malicious processes to prevent detection, modifies the underlying operating
system.
D. Protection from unauthorized modification. One of the three governing principles of
cyber security
Answer : D
2. Identity management
A. Maintaining the configuration of network devices, Systems applications and other IT resources
to ensure security controls are properly installed and maintained.
B. Protection from unauthorized access. One of the three governing principles of cyber security
C. A collective and common infrastructure, including directory services, authentication services,
authorization services, centralizes and standardizes integration of business process and
technology, so that it becomes consistent in common service across the organization
D. A vulnerability that is exploited before the software creator or vendor is even aware of its
existence
Answer : C
3. 1. Identify
4. 2. protect
5. 3. detect
6. 4. respond
7. 5. Recover
Answer: C
A. Malware
https://www.genuinedumps.com/
B. Spear Phishing
C. Adware
D. Spyware
Answer : C
A. Attack strategy in which the attacker intersects the communication stream between two parts
of the victim system and then replaces the traffic between the two components with the
intruders own, eventually assuming control of the communication
B. An attack where social engineering techniques are used to masquerade as a trusted party to
obtain important information such as passwords from the victim
C. An assault on the service from a single source that floods it with so many request that it
becomes overwhelmed and is either stopped completely or operates at a significantly reduced
rate.
D. And attack made by trying all possible combinations of passwords or encryption keys until the
correct one is found.
Answer: C
6. When a program or process tries to store more data in a buffer (temporary data storage area) than it
was intended to hold.
A. Zero-Day
B. Exploit Buffer
C. overflow Inherent
D. Risk Authorization
Answer : D
7. Access lists
A. The risk level or exposure without taking into account the actions that management has taken
or might take.
B. Filler traffic at router interfaces based on specific criteria, the supporting basic network security.
Without this, all packets pass
C. Ensures that changes to processes, systems, software, applications, platforms and
configurations are introduced in orderly, controlled manner.
D. A register of users (including groups, machines and processes) Who have permission to use a
particular system resource.
Answer: B
https://www.genuinedumps.com/
8. A weakness in the design, implementation, operation or internal control of a process that could
expose the system to adverse threats from threat events
A. Vulnerability
B. Confidentiality
C. Authorization
D. Change Management
Answer: A
9. An attack where social engineering techniques are used to masquerade as a trusted party to
obtain important information such as passwords from the victim.
A. Denial of service attack
B. Spear Phishing
C. Advanced Persistent Threats (APTs)
D. Man in the middle attack
Answer: B
10. Backdoor
Answer: A
11. Designed to gain access to targeted computer systems, still information, or disrupt computer
operations
https://www.genuinedumps.com/
A. Brute Force Attack
B. Spyware
C. Adware
D. Malware
Answer: D
12. Rootkit
Answer: B
2) Risk based
3) ad hoc
C. Governance
2) Risk
3) Compliance
https://www.genuinedumps.com/
Answer: B
14. Ensures that changes to processes, systems, software, applications, platforms and
configurations are introduced in orderly, controlled manner.
A. Change Management
B. Social Engineering
C. Access lists
D. Vulnerability
Answer: A
15. Asset
Answer: A
A. When a program or process tries to store more data in a buffer (temporary data storage
area) than it was intended to hold.
B. A register of users (including groups, machines and processes) Who have permission to
use a particular system resource.
C. Filler traffic at router interfaces based on specific criteria, the supporting basic network
security. Without this, all packets pass
D. A piece of malware that gains access to a targeted system by hiding within a genuine
application.
Answer: B
https://www.genuinedumps.com/
17. Man in the middle attack
A. Attack strategy in which the attacker intersects the communication stream between two
parts of the victim system and then replaces the traffic between the two components
with the intruders own, eventually assuming control of the communication
B. Attacks by an adversary who possesses sophisticated levels of expertise and significant
resources, which allow the attacker to create opportunities to achieve its objective,
using multiple attack vectors.
C. And attack made by trying all possible combinations of passwords or encryption keys
until the correct one is found.
D. A type of electronic mail attack that attempts to convince the user that the originator is
genuine, but with the intention of obtaining information for use in social engineering.
Answer: A
A. 1) identify
2) protect
3) detect
4) respond
5) recover
C. 1) compliance based
2) risk based
3) ad hoc
Answer: B
https://www.genuinedumps.com/
19. Defines groups of functionality required for network computers into layers with each layer
implementing standard protocol for its functionality,
Answer: D
20. A large automated and distributed network previously compromised computers that can be
simultaneously controlled to launch large-scale attacks such as denial of service.
A. Trojan Horses
B. Botnets
C. Vulnerability
D. Rootkit
Answer: B
Answer: A
22. Phishing
A. An attack where social engineering techniques are used to masquerade as a trusted party to
obtain important information such as passwords from the victim
B. An assault on the service from a single source that floods it with so many request that it
becomes overwhelmed and is either stopped completely or operates at a significantly reduced
rate.
https://www.genuinedumps.com/
C. A type of electronic mail attack that attempts to convince the user that the originator is genuine,
but with the intention of obtaining information for use in social engineering.
D. Attack strategy in which the attacker intersects the communication stream between two parts
of the victim system and then replaces the traffic between the two components with the
intruders own, eventually assuming control of the communication
Answer: C
A. When a program or process tries to store more data in a buffer (temporary data storage area)
than it was intended to hold.
B. Used for access control and requires that the system be able to identify and differentiate among
users Protection from unauthorized modification.
C. One of the three governing principles of cyber security
D. A piece of malware that gains access to a targeted system by hiding within a genuine
application.
Answer: D
24. Maintaining the configuration of network devices, systems applications and other IT resources
to ensure security controls are properly installed and maintained.
A. Configuration management
B. Vulnerability Access
C. control lists
D. Privileged user management
Answer: A
25. Virus
https://www.genuinedumps.com/
D. A piece of self-replicating code designed to spread itself across computer networks. It does not
require intervention for execution to replicate.
Answer: B
26. Locks or encrypts data or functions and demands a payment to unlock them.
A. Residual Risk
B. Ransomware
C. Authorization
D. Key logger
Answer: B
A. Payload
B. Ransomware
C. Botnets
D. Threat
Answer: A
https://www.genuinedumps.com/
Answer: B
29. Confidentiality
A. Protection from unauthorized modification. One of the three governing principles of cyber
security
B. Used for access control and requires that the system be able to identify and differentiate among
users
C. Any attempt to exploit social vulnerabilities to gain access to information and or systems,
involves a "con game."
D. Protection from unauthorized access. One of the three governing principles of cyber security
Answer: D
Answer: C
31. Secretly records user keystrokes and, in some cases, screen content.
A. Integrity
B. Ransomware
C. Keylogger
D. Payload
Answer: C
32. Spyware
A. An attack where social engineering techniques are used to masquerade as a trusted party to
obtain important information such as passwords from the victim
https://www.genuinedumps.com/
B. Gathers information about a person or organization without the knowledge of that person or
organization.
C. Designed to gain access to targeted computer systems, still information, or disrupt computer
operations And attack made by trying all possible combinations of passwords or encryption keys
until the correct one is found.
Answer: B
33. Account, password and control rights creation and management followed by subsequent
suspension and deletion of said accounts after an employee has left.
Answer: B
A. A weakness in the design, implementation, operation or internal control of a process that could
expose the system to adverse threats from threat events
B. Permits authorized users to maintain and protect systems and networks. They can modify or
circumvent existing safeguards such as access controls or logging
C. Maintaining the configuration of network devices, Systems applications and other IT resources
to ensure security controls are properly installed and maintained.
D. Defines groups of functionality required for network computers into layers with each layer
implementing standard protocol for its functionality,
Answer: C
https://www.genuinedumps.com/
C. Protection from unauthorized access. One of the three governing principles of cyber security
D. The risk level or exposure without taking into account the actions that management has taken
or might take.
Answer: D
36. The combination of the probability of an event and its consequences, mitigated through the use
of controls or safeguards
A. Rootkit
B. Inherent Risk
C. Risk
D. Asset
Answer: C
A. An attack where social engineering techniques are used to masquerade as a trusted party to
obtain important information such as passwords from the victim
B. A type of electronic mail attack that attempts to convince the user that the originator is genuine,
but with the intention of obtaining information for use in social engineering.
C. A weakness in the design, implementation, operation or internal control of a process that could
expose the system to adverse threats from threat events
D. A piece of self replicating code designed to spread itself across computer networks. It does not
require intervention for execution to replicate.
Answer: D
https://www.genuinedumps.com/
Answer: D
Answer: C
A. An assault on the service from a single source that floods it with so many request that it
becomes overwhelmed and is either stopped completely or operates at a significantly reduced
rate.
B. And attack made by trying all possible combinations of passwords or encryption keys until the
correct one is found.
C. A type of electronic mail attack that attempts to convince the user that the originator is genuine,
but with the intention of obtaining information for use in social engineering.
D. Attack strategy in which the attacker intersects the communication stream between two parts
of the victim system and then replaces the traffic between the two components with the
intruders own, eventually assuming control of the communication
Answer: B
41. A vulnerability that is exploited before the software creator or vendor is even aware of its
existence
A. Confidentiality
B. Vulnerability
C. Zero-Day Exploit
D. Social Engineering
https://www.genuinedumps.com/
Answer: C
Answer: D
43.Threat
A. Anything that is capable of acting against an asset in a manner that can result in harm
B. Hides malicious processes to prevent detection, modifies the underlying operating system.
C. Something of either tangible or intangible value that is worth protecting, including people,
information, infrastructure, finances and reputation
D. Protection from unauthorized modification. One of the three governing principles of cyber
security
Answer: A
44.Social Engineering
Answer: D
https://www.genuinedumps.com/
45. Solutions to software programming errors.
A. Patch Management
B. Authorization
C. Social Engineering
D. Ransomware
Answer: A
46. The concept that a message or other piece of information is genuine. Assures that the Dara's
integrity is protected and that the party sending or receiving it cannot deny repudiate that they sent or
received it.
A. Change Management
B. Non repudiation
C. Social Engineering
D. Configuration management
Answer: B
47. Authorization
Answer: C
https://www.genuinedumps.com/
A. Worm
B. Rootkit
C. Ransomware
D. Patch Management
Answer: A
A. A vulnerability that is exploited before the software creator or vendor is even aware of its
existence
B. A type of injection in which malicious scripts are injected into otherwise benign and trusted
websites. Attacks occur when an attacker uses a web application to send a malicious code,
generally in the form of a browser side script, to a different end user.
C. A means of regaining access to a compromised system by installing software or configuring
existing software to enable remote access under attacker defined conditions.
D. A collective and common infrastructure, including directory services, authentication services,
authorization services, centralizes and standardizes integration of business process and
technology, so that it becomes consistent in common service across the organization
Answer: B
A. Defines groups of functionality required for network computers into layers with each layer
implementing standard protocol for its functionality,
B. Permits authorized users to maintain and protect systems and networks. They can modify or
circumvent existing safeguards such as access controls or logging
C. Account, password and control rights creation and management followed by subsequent
suspension and deletion of said accounts after an employee has left.
D. Maintaining the configuration of network devices, systems applications and other IT resources
to ensure security controls are properly installed and maintained.
Answer: B
https://www.genuinedumps.com/
51. Three common controls used to protect the availability of information are:
52. Select all that apply. Governance has several goals, including:
Answer: A, B, C, E
o A. Encrypt
o B. Protect
o C. Investigate
o D. Recover
o E. Identify
Answer: B, D, E
Answer::D
55. Which of the following cybersecurity roles is charged with the duty of
managing incidents and remediation?
o A. Board of directors
o B. Executive committee
o C. Cybersecurity management
o D. Cybersecurity practitioners
https://www.genuinedumps.com/
56. Select all that apply. The internet perimeter should:
Discuss
Answer: A, B, D, E
57. The _________ layer of the OSI model ensures that data are transferred
reliably in the correct sequence, and the _________ layer coordinates and
manages user connections.
o 䄮 Pr敳e湴慴i潮, d慴愠link
o 䈮 呲慮獰潲t, 獥獳i潮
o 䌮 P桹si捡l, 慰plic慴ion
o 䐮 D慴愠link, 湥tw潲k
Answer: B
58. Choose three. There key benefits of the DMZ system are:
Discuss
Answer: A,B,E
59. Which of the following best states the role of encryption within an overall
cybersecurity program?
Answer: D
60. The number and types of layers needed for defense in depth are a function
of:Discuss
https://www.genuinedumps.com/
o
o
o
o
Answer: A
o
o
o
o
Answer: A
o
o
o
o
63. Select all that apply. Which of the following are considered functional areas of
network management as defined by ISO?
o
o
o
o
o
o
o
o
o
https://www.genuinedumps.com/
64. Vulnerability management begins with an understanding of cybersecurity
assets and their locations, which can be accomplished by:
o 䄮 Vuln敲慢ility 獣慮ni湧
o 䈮 P敮整r慴i潮 t敳ti湧
o 䌮 Mai湴慩湩湧 慮 a獳整 inv敮t潲y
o 䐮 U獩n朠捯mm慮搠lin攠t潯ls
Answer : C
Answer A
Answer: B,D,E
o 䄮 Pr数慲慴i潮
o 䈮 I摥湴ific慴i潮
o 䌮 C潮tainme湴
o 䐮 Eradic慴ion
Answer : C
o 䄮 Dis慳t敲
https://www.genuinedumps.com/
o 䈮 Ev敮t
o 䌮 周r敡t
o 䐮 I湣i摥湴
Answer: D
69. Select all that apply. A business impact analysis (BIA) should identify:
Answer:: B,C,D
Answer : B
71. Select all that apply. Which of the following statements about advanced
persistent threats (APTs) are true?
A湳w敲: A, B , C
https://www.genuinedumps.com/
o 䐮 Se捵物瑹 risk i猠歮潷渠t漠t桥 畳敲
A湳w敲: B,C
73. Choose three. Which types of risk are typically associated with mobile
devices?
o 䄮 Or条湩z慴io湡l risk
o 䈮 Compli慮c攠risk
o 䌮 Te捨ni捡l risk
o 䐮 P桹si捡l risk
o 䔮 呲慮獡捴io湡l risk
Answer: A,C,D
74. Which three elements of the current threat landscape have provided
increased levels of access and connectivity, and, therefore, increased
opportunities for cybercrime?
A湳w敲::D
o 䄮 䱯捡l 慲敡 n整w潲k
o 䈮 Demilit慲楺敤 z潮e
o 䌮 Wir敬敳猠灲潴e捴敤 慲ea
o 䐮 irt畡l 灲楶慴攠湥tw潲k
Answer: B
76. when an attack is happening, the IPS can actually help block the attack.
o 䄮 呲略
o 䈮 F慬獥
Answer : A
https://www.genuinedumps.com/
o 䄮 K敲湥l m潤攬 畳敲 m潤e
o 䈮 U獥爠mo摥, 步牮el mo摥
o 䌮 Saf攠m潤攬 畳敲 m潤e
o 䐮 K敲湥l m潤攬 湯rm慬 mo摥
Answer : A
Answer: A , B , C
https://www.genuinedumps.com/