ISACA • ITCA
Entry-level certification that validates fundamental knowledge in cybersecurity concepts, one of five certificates in the ITCA program.
Questions
596
Duration
120 minutes
Passing Score
65%
Difficulty
FoundationalLast Updated
Jan 2026
The ISACA Cybersecurity Fundamentals Certificate is one of five stackable credentials that together comprise the Information Technology Certified Associate (ITCA) program. It validates foundational knowledge of cybersecurity principles, threat landscapes, asset security, and security operations — the core competencies required to begin a career protecting enterprise data and infrastructure. The exam blends knowledge-based multiple-choice questions with performance-based questions delivered in a virtual lab environment, ensuring candidates can demonstrate practical ability alongside theoretical understanding.
The certificate is part of ISACA's broader effort to create an entry-level pathway into IT credentialing. Candidates who earn all five ITCA certificates — covering Computing Fundamentals, Networking and Infrastructure, Cybersecurity, Software Development, and Data Science — can then apply for the full ITCA certification. The Cybersecurity Fundamentals certificate itself does not expire and awards 9.5 CPE credits when the accompanying course is completed.
This certificate is designed for individuals at the very beginning of their IT or cybersecurity career journey, including recent graduates, college students, and professionals from non-technical fields looking to transition into cybersecurity. No prior work experience in IT is required, making it accessible to career changers who want a recognized credential to validate self-taught or academic knowledge.
It is also well-suited for IT generalists, help desk technicians, or junior administrators who want to formalize their cybersecurity knowledge and differentiate themselves for roles such as security analyst, IT support specialist, or junior SOC analyst. Organizations may also use it as a structured upskilling tool for existing technical teams.
There are no formal prerequisites for the Cybersecurity Fundamentals certificate. Candidates can register and sit for the exam at any time without prior certifications, work experience documentation, or educational requirements — distinguishing it from ISACA's more advanced credentials such as CISM or CISA.
While no prerequisites are mandated, candidates will benefit from a basic familiarity with computing concepts, networking fundamentals, and general IT terminology before attempting the exam. ISACA offers an optional self-paced online course (9.5 CPE credits) and a study guide authored by subject-matter experts to help candidates without a formal cybersecurity background build the necessary knowledge before sitting for the exam.
The exam consists of 75 questions delivered in a computer-based, remotely proctored format. Questions are a blend of knowledge-based multiple-choice items and performance-based questions set within a virtual lab environment, requiring candidates to demonstrate practical task execution rather than purely theoretical recall. The time limit is 120 minutes, and a passing score of 65% is required.
The exam is available continuously — candidates can schedule it as early as 48 hours after payment, with appointments available up to 90 days in advance. Free rescheduling is permitted with at least 48 hours' notice. Candidates have 365 days from the date of purchase to sit for the exam, and there is no stated limit on retake attempts. Exam fees are US$120 for ISACA members and US$144 for non-members.
Earning the Cybersecurity Fundamentals certificate signals to employers that a candidate has verified, baseline competency in protecting systems and data — a quality increasingly valued even for non-security IT roles. It serves as a credible entry point for positions such as junior security analyst, SOC tier-1 analyst, IT support specialist, or cybersecurity technician, particularly at organizations that recognize ISACA credentials (common in financial services, government, and enterprise technology sectors).
As a standalone certificate it complements ISACA's advanced certifications (CISM, CISA, CRISC), providing a documented foundation that can accelerate a candidate's path toward those credentials. For candidates who complete all five ITCA badges and earn the full ITCA certification, the credential demonstrates breadth across core IT disciplines — making it a differentiator in entry-level hiring where employers seek candidates who can operate across multiple technology domains from day one.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 596 questions.
1. A Fortune 500 company is conducting a risk assessment for a new cloud migration project. The security team identifies a critical vulnerability in a legacy application that will be migrated. Exploiting this vulnerability could result in $5 million in losses. The probability of exploitation is assessed at 40%. Implementing a security control costs $500,000. What is the Annual Loss Expectancy (ALE) for this risk? (Select one!)
Explanation
Annual Loss Expectancy (ALE) is calculated as Single Loss Expectancy (SLE) multiplied by Annual Rate of Occurrence (ARO). In this case, SLE is $5,000,000 and the probability (ARO) is 40% or 0.4. Therefore, ALE equals $5,000,000 times 0.4 which equals $2,000,000. The $5,000,000 represents the maximum potential impact without considering probability. The $1,500,000 would result from incorrect calculation using 30% probability. The $500,000 is the cost of the control, not the ALE. Understanding ALE helps organizations make risk-based decisions by comparing the cost of controls against expected losses, determining whether the $500,000 control is justified.
2. A network engineer needs to connect a new external SSD to a laptop for 4K video transfer requiring sustained 20 Gbps throughput. The laptop has USB 3.1 Gen 2 Type-A and USB4 Type-C ports. Which connection should they use? (Select one!)
Explanation
USB4 Type-C port provides 40 Gbps bandwidth, well exceeding the 20 Gbps requirement for 4K video transfer and ensuring sustained throughput without bottlenecks. USB4 also supports Thunderbolt 3 compatibility and uses Type-C connector exclusively. USB 3.1 Gen 2 Type-A provides only 10 Gbps, insufficient for the 20 Gbps requirement. USB 2.0 at 480 Mbps is 40 times slower than needed. USB 3.0 at 5 Gbps is only one-quarter of the required bandwidth. Only USB4 Type-C meets the performance requirements for high-speed 4K video workflows.
3. A university research department analyzes exam score distributions for 200 students to identify potential grading anomalies. The dataset shows a mean score of 75, median score of 78, and mode of 82. The standard deviation is 15 points. A professor identifies three students with scores of 22, 25, and 28 who performed significantly below the rest of the class. Which statistical measure is most resistant to the influence of these outlier scores and provides the most representative measure of central tendency for the majority of students? (Select one!)
Explanation
Median is correct because it represents the middle value when scores are ordered and is resistant to outliers. With a median of 78 compared to a mean of 75, the median provides a more representative measure of central tendency for the majority of students because it is not pulled downward by the three extreme low scores. The median divides the dataset in half regardless of how extreme the outlier values are. Mean is sensitive to outliers because it incorporates all values equally in its calculation, so the three very low scores (22, 25, 28) drag the average down from where the bulk of the distribution lies. Mode identifies the most common score but may not be representative of the overall distribution and is less useful for continuous numerical data where many values may not repeat. Range measures dispersion (spread) rather than central tendency and is extremely sensitive to outliers since it depends entirely on the minimum and maximum values, making it unsuitable for representing where the center of the data lies.
4. A systems administrator needs to determine why a Linux server is experiencing performance degradation. Users report slow application response times. The administrator needs to identify if the bottleneck is CPU, memory, disk I/O, or network. Which command should the administrator run first to get a comprehensive real-time overview of system resource utilization? (Select one!)
Explanation
The top command provides a comprehensive real-time view of system performance including CPU utilization, memory usage, swap usage, and per-process resource consumption. It dynamically updates and allows sorting by CPU or memory to identify resource-intensive processes. Top shows load averages, uptime, and the number of running processes, giving a complete picture to diagnose whether CPU, memory, or specific processes are causing the bottleneck. Netstat shows network connections but doesn't display CPU, memory, or disk metrics needed to diagnose overall performance issues. The df command only shows disk space usage, not disk I/O performance or other resource utilization. The lspci command lists hardware devices but provides no information about current resource utilization or performance metrics.
5. A security analyst discovers that a web application accepts the following SQL query input from users without validation: SELECT * FROM users WHERE username = '$input'. An attacker enters: admin' OR '1'='1' -- as the username. What vulnerability is being exploited and what is the most effective prevention method? (Select one!)
Explanation
This is a SQL Injection attack where the input admin' OR '1'='1' -- manipulates the SQL query logic. The single quote closes the username string, OR '1'='1' makes the condition always true, and -- comments out the rest of the query. Parameterized queries (prepared statements) are the most effective prevention because they separate SQL code from data, treating user input as literal values rather than executable code. Cross-Site Scripting involves injecting malicious scripts into web pages viewed by other users, not manipulating database queries. Cross-Site Request Forgery tricks authenticated users into executing unwanted actions, which is unrelated to this SQL manipulation. Filtering special characters is insufficient because attackers can use encoding techniques to bypass filters, and this approach is error-prone compared to parameterized queries.
One-time access to this exam