IT Questions Bank Mar 16, 2020 Last Updated: Apr 13, 2022 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Cyber Threat ManagementWhich statement describes the Cyber Kill Chain?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementWhich action should be included in a plan element that is part of a computer security incident response capability (CSIRC)?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementWhat is a MITRE ATT&CK framework?ITExamAnswers asked 1 year ago • CCNA CyberOps, Cyber Threat ManagementWhich meta-feature element in the Diamond Model describes tools and information (such as software, black hat knowledge base, username and password) that the adversary uses for the intrusion event?ITExamAnswers asked 1 year ago • CCNA CyberOps, Cyber Threat ManagementAccording to NIST, which step in the digital forensics process involves extracting relevant information from data?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementA threat actor has gained administrative access to a system and achieved the goal of controlling the system for a future DDoS attack by establishing a communication channel with a CnC owned by the threat actor. Which phase in the Cyber Kill Chain model describes the situation?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementThe company you work for has asked you to create a broad plan that includes DRP and getting critical systems to another location in case of disaster. What type of plan are you being asked to create?ITExamAnswers asked 5 months ago • Cyber Threat ManagementAfter containing an incident that infected user workstations with malware, what are three effective remediation procedures that an organization can take for eradication? (Choose three.)ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementAfter a threat actor completes a port scan of the public web server of an organization and identifies a potential vulnerability, what is the next phase for the threat actor in order to prepare and launch an attack as defined in the Cyber Kill Chain?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementWhat is the purpose of the policy element in a computer security incident response capability of an organization, as recommended by NIST?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementA user is asked to create a disaster recovery plan for a company. The user needs to have a few questions answered by management to proceed. Which three questions should the user ask management as part of the process of creating the plan? (Choose three.)ITExamAnswers asked 10 months ago • Cyber Threat Management, Cybersecurity EssentialsWhich two actions can help identify an attacking host during a security incident? (Choose two.)ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementWhich term is used in the Diamond Model of intrusion to describe a tool that a threat actor uses toward a target system?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementA user is asked to evaluate the security posture of a company. The user looks at past attempts to break into the company and evaluates the threats and exposures to create a report. Which type of risk analysis could the user perform?ITExamAnswers asked 10 months ago • Cyber Threat Management, Cybersecurity EssentialsWhich access control should the IT department use to restore a system back to its normal state?ITExamAnswers asked 10 months ago • Cyber Threat Management, Cybersecurity Essentials