IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich Windows version was the first to introduce a 64-bit Windows operating system?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat are the steps in the vulnerability management life cycle?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementWhich meta-feature element in the Diamond Model describes information gained by the adversary?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat is a characteristic of CybOX?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich step in the Vulnerability Management Life Cycle performs inventory of all assets across the network and identifies host details, including operating system and open services?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich type of evaluation includes the assessment of the likelihood of an attack, the type of threat actor likely to perpetrate such an attack, and what the consequences could be to the organization if the exploit is successful?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich statement describes Trusted Automated Exchange of Indicator Information (TAXII)?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich action should be included in a plan element that is part of a computer security incident response capability (CSIRC)?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementTo ensure that the chain of custody is maintained, what three items should be logged about evidence that is collected and analyzed after a security incident has occurred? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is the primary objective of a threat intelligence platform (TIP)?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich metric in the CVSS Base Metric Group is used with an attack vector?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich statement describes the threat-vulnerability (T-V) pairing?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat is a chain of custody?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhen a server profile for an organization is being established, which element describes the TCP and UDP daemons and ports that are allowed to be open on the server?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementPlace the seven steps defined in the Cyber Kill Chain in the correct order.ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat Management