Cyber Security Fundamentals 2020 Pre‑Test Answers: A thorough look
Cyber security fundamentals form the backbone of every modern digital ecosystem. Whether you’re a student preparing for a certification exam, a professional brushing up on core concepts, or a curious learner wanting to understand the landscape, having a solid grasp of the key topics is essential. This article dives deep into the 2020 pre‑test questions commonly asked in cyber security fundamentals courses, explains the underlying principles, and provides clear, concise answers that reflect current best practices And that's really what it comes down to..
Introduction
The 2020 Cyber Security Fundamentals pre‑test is designed to assess understanding of critical concepts such as threat models, risk management, defensive architectures, and the legal‑ethical framework governing information security. The questions cover a broad spectrum:
- Threat Identification – Recognizing malware, phishing, and advanced persistent threats (APTs).
- Risk Assessment – Evaluating likelihood, impact, and mitigation strategies.
- Security Controls – Understanding preventive, detective, and corrective measures.
- Security Policies & Governance – Crafting policies, roles, and compliance requirements.
- Incident Response – Planning, execution, and recovery.
- Emerging Technologies – Cloud security, IoT, and AI implications.
By mastering these areas, you’ll be equipped to design strong security postures and confidently answer exam questions.
1. Threat Identification
1.1 What is a phishing attack?
Answer:
Phishing is a social engineering technique that deceives users into revealing sensitive information—such as usernames, passwords, or credit‑card numbers—by masquerading as a trustworthy entity in electronic communication. Typical indicators include:
- Suspicious email addresses or mismatched URLs.
- Urgent or alarming language (“Your account will be closed!”).
- Requests for personal data or credential entry on unfamiliar sites.
1.2 How does ransomware differ from adware?
Answer:
Ransomware encrypts the victim’s data and demands payment for decryption, effectively holding the data hostage. Adware, conversely, injects advertisements into the user’s experience, often tracking behavior for marketing purposes. The key distinction lies in intent: ransomware aims to extort money, while adware seeks advertising revenue.
1.3 Define Advanced Persistent Threat (APT).
Answer:
An APT is a long‑term, targeted cyber intrusion where an attacker gains covert access to a network, remains undetected for an extended period, and systematically extracts valuable information. APTs are typically state‑sponsored or highly organized, employing sophisticated malware, zero‑day exploits, and custom tools.
2. Risk Assessment
2.1 What is the difference between likelihood and impact in risk analysis?
Answer:
- Likelihood measures how probable it is that a threat will materialize.
- Impact quantifies the severity of consequences if the threat succeeds.
Risk is often visualized as a matrix combining both dimensions, guiding prioritization of controls.
2.2 Explain the ISO 27005 risk management process.
Answer:
ISO 27005 outlines a systematic approach:
- Context Establishment – Define scope, objectives, and risk criteria.
- Risk Identification – Catalog threats, vulnerabilities, and assets.
- Risk Analysis – Determine likelihood and impact.
- Risk Evaluation – Compare against risk appetite.
- Risk Treatment – Select controls (avoid, transfer, mitigate, accept).
- Risk Acceptance – Document decisions for residual risks.
- Monitoring & Review – Continuously assess effectiveness.
2.3 What is a risk register?
Answer:
A risk register is a living document listing identified risks, their attributes (description, likelihood, impact, owner), treatment plans, and status. It serves as the central repository for risk management activities, ensuring visibility and accountability.
3. Security Controls
3.1 Differentiate between preventive, detective, and corrective controls.
Answer:
| Control Type | Purpose | Example |
|---|---|---|
| Preventive | Stops incidents before they occur. | Firewalls, encryption, access control lists. |
| Detective | Identifies incidents after they happen. | Intrusion Detection Systems (IDS), log monitoring. |
| Corrective | Restores normal operations post‑incident. | Backup restoration, patch management. |
3.2 What is Defense in Depth?
Answer:
Defense in Depth is a layered security strategy where multiple controls overlap to protect assets. If one layer fails, others continue to provide protection, reducing overall risk. Typical layers include:
- Physical security
- Network security
- Endpoint security
- Application security
- Data security
3.3 Explain the CIA Triad and its relevance.
Answer:
The CIA Triad—Confidentiality, Integrity, and Availability—is the foundational model for information security:
- Confidentiality ensures data is accessed only by authorized parties.
- Integrity guarantees data remains accurate and unaltered.
- Availability ensures systems and data are accessible when needed.
Security measures are evaluated against these three pillars to ensure comprehensive protection But it adds up..
4. Security Policies & Governance
4.1 What is a security policy and why is it important?
Answer:
A security policy is a formal, documented set of rules that guide the organization’s security practices. It establishes expectations, defines responsibilities, and aligns security strategies with business objectives. Policies provide a framework for consistent decision‑making and compliance Small thing, real impact..
4.2 Outline the roles in a typical Information Security Management System (ISMS).
Answer:
- Chief Information Security Officer (CISO) – Executive oversight.
- Security Manager – Day‑to‑day operations.
- Security Analyst – Monitoring, detection, and response.
- Compliance Officer – Regulatory adherence.
- Legal Counsel – Policy drafting, incident legalities.
- IT Staff – Implementation of technical controls.
4.3 What are regulatory frameworks that influence cyber security?
Answer:
Key frameworks include:
- GDPR (EU General Data Protection Regulation) – Data privacy.
- HIPAA (Health Insurance Portability and Accountability Act) – Health data.
- PCI DSS (Payment Card Industry Data Security Standard) – Cardholder data.
- NIST SP 800‑53 – US federal information systems.
- ISO/IEC 27001 – International information security management.
These frameworks dictate minimum security controls and compliance obligations.
5. Incident Response
5.1 What are the stages of an incident response lifecycle?
Answer:
- Preparation – Policies, tools, and training.
- Identification – Detecting potential incidents.
- Containment – Limiting spread.
- Eradication – Removing threat artifacts.
- Recovery – Restoring services.
- Lessons Learned – Post‑mortem analysis and improvement.
5.2 Why is communication critical during an incident?
Answer:
Clear communication ensures stakeholders are informed, preserves evidence integrity, and coordinates response actions. Miscommunication can exacerbate damage, delay recovery, and lead to legal repercussions.
5.3 What is a playbook in incident response?
Answer:
A playbook is a pre‑defined, step‑by‑step guide for handling specific incident types (e.g., ransomware, data breach). It standardizes responses, reduces reaction time, and ensures consistency across teams Worth keeping that in mind..
6. Emerging Technologies
6.1 How does cloud security differ from traditional on‑prem security?
Answer:
Cloud security emphasizes shared responsibility: the provider secures the infrastructure, while the customer secures data, applications, and identity. Key differences include:
- Elasticity – Rapid scaling requires dynamic controls.
- Multi‑tenancy – Isolation between tenants.
- API exposure – New attack surfaces.
- Data residency – Compliance across jurisdictions.
6.2 What are the security challenges of the Internet of Things (IoT)?
Answer:
- Limited computational resources restrict strong encryption.
- Default credentials and lack of updates create vulnerabilities.
- Massive attack surface due to device proliferation.
- Data privacy concerns from continuous sensor data collection.
6.3 Discuss AI and machine learning in cyber security.
Answer:
AI can enhance detection by analyzing large data sets for anomalies, but also introduces new risks:
- Adversarial attacks that manipulate model inputs.
- Model theft or misuse.
- Bias leading to false positives/negatives.
Organizations must balance AI benefits with rigorous governance and testing.
FAQ
| Question | Answer |
|---|---|
| **What is the most common entry point for attackers?But | |
| **What role does user education play? Which means | |
| **How often should security patches be applied? | |
| **How do you measure the effectiveness of a security program?On top of that, ** | Ideally within 48–72 hours of release, following a defined patch management policy. ** |
| **Can a single security control stop all threats?Consider this: ** | No; layered defenses are essential because threats evolve. ** |
It sounds simple, but the gap is usually here.
Conclusion
The Cyber Security Fundamentals 2020 Pre‑Test evaluates a comprehensive set of skills—from recognizing sophisticated threats to implementing layered defenses and managing incidents. Mastery of these concepts not only boosts exam performance but also equips professionals to safeguard digital assets in an ever‑changing threat landscape. By internalizing the principles outlined above, you’ll be ready to confront real‑world challenges with confidence and competence That alone is useful..
Easier said than done, but still worth knowing.