IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsA network administrator is creating a network profile to generate a network baseline. What is included in the critical asset address space element?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat three security tools does Cisco Talos maintain security incident detection rule sets for? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat three services are offered by FireEye? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich activity is typically performed by a threat actor in the installation phase of the Cyber Kill Chain?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementA cybersecurity analyst has been called to a crime scene that contains several technology items including a computer. Which technique will be used so that the information found on the computer can be used in court?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat is specified in the plan element of the NIST incident response plan?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich type of evidence supports an assertion based on previously obtained evidence?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat is the objective the threat actor in establishing a two-way communication channel between the target system and a CnC infrastructure?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementA company is applying the NIST.SP800-61 r2 incident handling process to security events. What are two examples of incidents that are in the category of precursor? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementMatch the NIST incident response stakeholder with the role.ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich task describes threat attribution?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementWhich type of data would be considered an example of volatile data?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementA security analyst is investigating a cyber attack that began by compromising one file system through a vulnerability in a custom software application. The attack now appears to be affecting additional file systems under the control of another security authority. Which CVSS v3.0 base exploitability metric score is increased by this attack characteristic?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich step in the Vulnerability Management Life Cycle determines a baseline risk profile to eliminate risks based on asset criticality, vulnerability threat, and asset classification?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich organization defines unique CVE Identifiers for publicly known information-security vulnerabilities that make it easier to share data?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat Management