IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Cyber Threat ManagementThe manager of a new data center requisitions magnetic door locks. The locks will require employees to swipe an ID card to open. Which type of security control is being implemented?IT Administrator asked 10 months ago • Cyber Threat ManagementMatch the intrusion event defined in the Diamond Model of intrusion to the description.IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat are the three impact metrics contained in the CVSS 3.0 Base Metric Group? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich two values are required to calculate annual loss expectancy? (Choose two.)ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsMatch the network profile element to the description. (Not all options are used.)IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat three tasks are accomplished by a comprehensive security policy? (Choose three.)ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity Essentials, Endpoint SecurityWhat is the function of the Cloud Security Alliance (CSA)?ITExamAnswers asked 2 years ago • Cyber Threat ManagementWhat are the steps in the vulnerability management life cycle?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementWhich meta-feature element in the Diamond Model describes information gained by the adversary?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat network testing tool would an administrator use to assess and validate system configurations against security policies and compliance standards?IT Administrator asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat is a characteristic of CybOX?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich step in the Vulnerability Management Life Cycle performs inventory of all assets across the network and identifies host details, including operating system and open services?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich type of evaluation includes the assessment of the likelihood of an attack, the type of threat actor likely to perpetrate such an attack, and what the consequences could be to the organization if the exploit is successful?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich two types of controls are effective after a violation of a security policy occurs? (Choose two.)ITExamAnswers asked 2 years ago • Cyber Threat ManagementWhat type of security test uses simulated attacks to determine possible consequences of a real threat?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat Management