Cybersecurity Fundamentals Specialist

Here you have the best ISA Cybersecurity Fundamentals Specialist practice exam questions

  • You have 77 total questions to study from
  • Each page has 5 questions, making a total of 16 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 17, 2024
Question 1 of 77

Which characteristic is MOST closely associated with the deployment of a demilitarized zone (DMZ)?

    Correct Answer: C

    A demilitarized zone (DMZ) in a network architecture is typically associated with providing a buffer zone between the internal network and external sources like the internet. The primary characteristic of a DMZ is that it allows controlled access to external resources such as the internet, typically by placing web servers or other public-facing applications within the DMZ. This setup ensures that the internal network remains protected while allowing some level of interaction with the outside world through the firewall. Therefore, the characteristic most closely associated with the deployment of a DMZ is that Internet access through the firewall is allowed.

Question 2 of 77

Whose responsibility is it to determine the level of risk an organization is willing to tolerate?

    Correct Answer: A

    It is the responsibility of management to determine the level of risk an organization is willing to tolerate. Management sets the strategic direction and risk appetite of the organization based on its goals, resources, and external environment. Other departments like Legal, Operations, and Safety may provide input and support, but ultimately, it is management that makes the final decision regarding risk tolerance.

Question 3 of 77

Which activity is part of establishing policy, organization, and awareness?

    Correct Answer: A

    Establishing policy, organization, and awareness involves creating and communicating policies to ensure everyone in the organization understands and aligns with the established rules and procedures. Communicating policies is a core part of this process as it helps disseminate crucial information throughout the organization.

Question 4 of 77

What is the name of the missing layer in the Open Systems Interconnection (OSI) model shown below?

    Correct Answer: C

    The missing layer in the Open Systems Interconnection (OSI) model is the Transport layer. This layer is responsible for end-to-end communication and error handling, and protocols like TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at this layer. The Transport layer ensures complete data transfer and manages the reliability of a given link through flow control, segmentation/desegmentation, and error control.

Question 5 of 77

Which service does an Intrusion Detection System (IDS) provide?

    Correct Answer: D

    An Intrusion Detection System (IDS) is designed to detect attempts to break into or misuse a computer system. It monitors network traffic for suspicious activity and alerts administrators when such activities are detected. It does not act as a physical or preventative lock on systems (as in option A), nor is it capable of blocking traffic (as in option C). While it helps identify vulnerabilities when they are exploited, it is not effective against all vulnerabilities (as in option B).