IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich option is unnecessary for determining the appropriate containment strategy according to NIST.SP80061r2?ITExamAnswers asked 4 years ago • CCNA CyberOpsRefer to the exhibit. What can be determined from this ping result?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich feature is used to find possible vulnerable services running on a server?ITExamAnswers asked 4 years ago • CCNA CyberOpsIn VERIS, an incident is viewed as a series of events that adversely affects the information assets of an organization. Which option contains the elements that every event is comprised of according to VERIS incident model’?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich two options can be used by a threat actor to determine the role of a server? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat mechanism does the Linux operating system provide to control access to files?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich kind of evidence can be considered most reliable to arrive at an analytical assertion?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich option filters a LibPCAP capture that used a host as a gateway?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich data type is protected under the PCI compliance framework?ITExamAnswers asked 4 years ago • CCNA CyberOpsYou have run a suspicious file in a sandbox analysis tool to see what the file does. The analysis report shows that outbound callouts were made post infection. Which two pieces of information from the analysis report are needed or required to investigate the callouts? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich two statements correctly describe the victim demographics section of the VERIS schema? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOpsYou see confidential data being exfiltrated to an IP address that is attributed to a known Advanced Persistent Threat group. Assume that this is part of a real attack and not a network misconfiguration. Which category does this event fall under as defined in the Diamond Model of Intrusion?ITExamAnswers asked 4 years ago • CCNA CyberOpsAn organization has recently adjusted its security stance in response to online threats made by a known hacktivist group. Which term defines the initial event in the NIST SP800-61 r2?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich option is generated when a file is run through an algorithm and generates a string specific to the contents of that file?ITExamAnswers asked 4 years ago • CCNA CyberOpsNistsp800-61R2 what are the recommended protections against malware?ITExamAnswers asked 4 years ago • CCNA CyberOps