ISACA • CyberSec-Fund
Validates foundational cybersecurity knowledge across four domains: information security fundamentals, threat landscape, securing assets, and security operations and response, covering core security concepts, threat identification, data protection, and incident detection.
Questions
596
Duration
120 minutes
Passing Score
65%
Difficulty
FoundationalLast Updated
Feb 2026
The ISACA Cybersecurity Fundamentals Certificate validates foundational knowledge and practical skills across the core principles of cybersecurity. It covers the language, frameworks, and technologies that define the discipline, including information security fundamentals, data protection, threat identification, and security operations. The credential is designed to establish that a candidate understands both the theoretical underpinnings of cybersecurity and the practical role security professionals play in defending enterprise systems and data.
Unlike ISACA's more advanced practitioner certifications, this certificate is explicitly entry-level and carries no expiration date, making it a durable credential for those early in their cybersecurity journey. The exam blends traditional knowledge-based multiple-choice questions with performance-based questions set in a virtual lab environment, reflecting ISACA's emphasis on applied, real-world competency rather than purely memorized concepts.
This certificate is designed for students, recent graduates, and early-career IT professionals who want to establish a verified baseline in cybersecurity. It is also well-suited for IT professionals from adjacent disciplines—such as networking, systems administration, or software development—who are transitioning into security-focused roles and need to formalize their foundational knowledge.
Career changers from non-IT backgrounds entering the cybersecurity field will also find this credential valuable as a first step toward more advanced ISACA certifications such as the CSX-P (Cybersecurity Practitioner). Organizations looking to upskill staff or build internal cybersecurity awareness programs frequently use this certificate as a baseline benchmark for their teams.
There are no formal prerequisites for the Cybersecurity Fundamentals Certificate. ISACA allows candidates to register for and sit the exam at any time, with no required work experience, prior certifications, or formal education. This open-access policy reflects the foundational, entry-level nature of the credential.
While no prerequisites are mandated, candidates with some exposure to basic IT concepts—such as networking fundamentals, operating system basics, or general IT infrastructure—will find the material more approachable. Familiarity with concepts like access control, encryption basics, or network protocols is beneficial but not required to begin studying.
The exam consists of 60 scored questions delivered over 120 minutes, yielding roughly two minutes per question. It is administered online as a remotely proctored, closed-book exam, meaning candidates can take it from any suitable location without visiting a physical test center. The question format combines traditional knowledge-based multiple-choice questions with performance-based questions set in a virtual lab environment, testing practical application alongside conceptual understanding.
A passing score of 65% is required, meaning candidates must answer at least 39 of the 60 questions correctly. Exam eligibility is valid for 12 months from the date of registration. Candidates may reschedule their exam without penalty if they do so at least 48 hours before the scheduled appointment. The certificate itself does not expire once earned.
Earning the Cybersecurity Fundamentals Certificate signals to employers that a candidate has verified, baseline-level cybersecurity knowledge validated by ISACA—a globally recognized standards body also responsible for CISA, CISM, and CRISC. For entry-level roles such as Security Analyst, IT Security Technician, SOC Analyst (Tier 1), or Junior Penetration Tester, this credential helps candidates stand out in competitive applicant pools where many lack any formal cybersecurity validation. The digital badge issued through Credly allows holders to display their credential on LinkedIn and other professional platforms for immediate visibility to recruiters.
As a foundational certificate with no expiration date, it also serves as a stepping stone toward more advanced ISACA credentials. Candidates who go on to earn the CSX-P (Cybersecurity Practitioner) certification—ISACA's hands-on, performance-based practitioner credential—can expect significantly higher earning potential, with mid-career cybersecurity professionals commonly earning between $80,000 and $130,000 annually depending on role and region. The Cybersecurity Fundamentals Certificate positions candidates to begin that progression with a recognized, vendor-neutral credential accepted across industries.
1. A security operations center receives an alert that an attacker is sending a small DNS query that triggers a much larger DNS response directed at the victim's IP address. The attacker spoofs the source IP address to be the victim's address, and DNS servers send large responses to the victim, overwhelming their bandwidth. Which attack type is being conducted? (Select one!)
2. A security architect designs encryption strategy for an e-commerce platform storing customer payment information. The architecture must comply with PCI DSS requirements for protecting cardholder data at rest. Three encryption approaches are evaluated. Approach A uses AES-128 in ECB mode for fast encryption performance. Approach B uses AES-256 in CBC mode with random initialization vectors. Approach C uses AES-256 in GCM mode providing authenticated encryption. Which approach meets security best practices, and what is the PRIMARY security weakness of Approach A? (Select one!)
3. A network administrator configures switching infrastructure to prevent VLAN hopping attacks where attackers exploit Dynamic Trunking Protocol to gain access to multiple VLANs. Which two security measures should the administrator implement? (Select two!)
Select all that apply4. A cloud security team implements security controls for infrastructure-as-a-service environments hosting production applications. The team must understand the shared responsibility model to ensure comprehensive security coverage. Which two security responsibilities belong to the customer organization in IaaS environments? (Select two!)
Select all that apply5. A healthcare organization performs full backups on Sunday, with subsequent backups capturing only changes since the last backup of any type throughout the week. On Friday, the database becomes corrupted. The recovery team must restore the system using the minimum number of backup sets. Which backup strategy is the organization using? (Select one!)
All exams included • Cancel anytime