IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsFor how long does the Payment Card Industry Security Standards Council (PCI DSS) require that an audit trail of user activities related to protected information be retained?ITExamAnswers asked 2 years ago • CCNA CyberOpsIn which programming language is Elasticsearch written?ITExamAnswers asked 2 years ago • CCNA CyberOpsA network administrator is working with ELK. The amount of network traffic to be collected by packet captures and the number of log file entries and alerts that will be generated by network and security devices can be enormous. What is the default time configured in Kibana to show the log entries?ITExamAnswers asked 2 years ago • CCNA CyberOpsWhich technology is an open source SIEM system?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is the value of file hashes to network security investigations?ITExamAnswers asked 2 years ago • CCNA CyberOpsWhen real-time reporting of security events from multiple sources is being received, which function in SIEM provides capturing and processing of data in a common format?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich security management function is concerned with the implementation of systems that track the location and configuration of networked devices and software across an enterprise?ITExamAnswers asked 2 years ago • CCNA CyberOpsWhat are the core functions of the NIST Cybersecurity Framework?ITExamAnswers asked 2 years ago • CCNA CyberOpsWhen establishing a server profile for an organization, which element describes the type of service that an application is allowed to run on the server?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat technology supports asymmetric key encryption used in IPsec VPNs?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat role does an RA play in PKI?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is the purpose of code signing?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat are two symmetric encryption algorithms? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich protocol is an IETF standard that defines the PKI digital certificate format?IT Administrator asked 3 years ago • CCNA CyberOps, CCNA SecurityWhich algorithm can ensure data confidentiality?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security