iSACA Cybersecurity Fundamentals Certification Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Study for the iSACA Cybersecurity Fundamentals Certification Exam. Prepare with flashcards and multiple choice questions. Each question offers hints and explanations. Get exam ready!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following is NOT an objective of the Internet Perimeter?

  1. Monitoring internal network ports

  2. Preventing access to web applications

  3. Control user traffic bound for the internet

  4. Detecting and blocking malicious packets

The correct answer is: Preventing access to web applications

The objective of the Internet Perimeter fundamentally revolves around securing the network boundary that separates an internal network from the external internet. This is primarily accomplished through various controls, monitoring, and defense mechanisms. Preventing access to web applications does not align with the core objectives of the Internet Perimeter. Instead, the Internet Perimeter is designed to manage and control access to resources rather than outright preventing it. While security measures are indeed implemented to protect web applications from unauthorized access or attacks, these applications should be accessible to legitimate users when necessary, as they often serve critical business functions. On the other hand, monitoring internal network ports is crucial for identifying potential vulnerabilities. Controlling user traffic bound for the internet ensures that only authorized and safe data packets leave the network. Detecting and blocking malicious packets is equally vital, as it helps in actively defending against threats that can exploit vulnerabilities and compromise security. Thus, the correct identification of the option that does not serve as an objective of the Internet Perimeter rests in its essence of balancing security with the enables appropriate access, making the selected answer valid.