IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Cyber Threat ManagementWhich statement describes Trusted Automated Exchange of Indicator Information (TAXII)?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich action should be included in a plan element that is part of a computer security incident response capability (CSIRC)?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat information does the SIEM network security management tool provide to network administrators?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat is the primary objective of a threat intelligence platform (TIP)?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich metric in the CVSS Base Metric Group is used with an attack vector?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich statement describes the threat-vulnerability (T-V) pairing?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat is a chain of custody?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementMatch the data governance role to the correct function.ITExamAnswers asked 2 years ago • Cyber Threat ManagementWhich framework should be recommended for establishing a comprehensive information security management system in an organization?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsWhen a server profile for an organization is being established, which element describes the TCP and UDP daemons and ports that are allowed to be open on the server?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich risk mitigation strategies include outsourcing services and purchasing insurance?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsPlace the seven steps defined in the Cyber Kill Chain in the correct order.ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich security management plan specifies a component that involves tracking the location and configuration of networked devices and software across an enterprise?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat is the primary function of SANS?ITExamAnswers asked 3 years ago • CCNA CyberOps, CCNA Security, Cyber Threat ManagementWhich of the following principles is used by the U.S. government in its access control models?ITExamAnswers asked 2 years ago • Cyber Threat Management