IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich NIST-defined incident response stakeholder is responsible for coordinating incident response with other stakeholders and minimizing the damage of an incident?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich service is provided by the Cisco Talos Group?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementIn addressing an identified risk, which strategy aims to decrease the risk by taking measures to reduce vulnerability?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich two classes of metrics are included in the CVSS Base Metric Group? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementAccording to NIST, which step in the digital forensics process involves identifying potential sources of forensic data, its acquisition, handling, and storage?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementA cybersecurity analyst is performing a CVSS assessment on an attack where a web link was sent to several employees. Once clicked, an internal attack was launched. Which CVSS Base Metric Group Exploitability metric is used to document that the user had to click on the link in order for the attack to occur?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat is the purpose of the policy element in a computer security incident response capability of an organization, as recommended by NIST?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat will a threat actor do to create a back door on a compromised target according to the Cyber Kill Chain model?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementHow does network scanning help assess operations security?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Cyber Threat ManagementWhen establishing a network profile for an organization, which element describes the time between the establishment of a data flow and its termination?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementIn which step of the NIST incident response process does the CSIRT perform an analysis to determine which networks, systems, or applications are affected; who or what originated the incident; and how the incident is occurring?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich type of analysis relies on predefined conditions and can analyze applications that only use well-known fixed ports?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseHow do cybercriminals make use of a malicious iFrame?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Network DefenseWhat is the purpose of the DH algorithm?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich access control model assigns security privileges based on the position, responsibilities, or job classification of an individual or group within an organization?IT Administrator asked 4 years ago • CCNA CyberOps, Network Defense