IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Cyber Threat ManagementIn which situation would a detective control be warranted?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsA user is asked to evaluate the security posture of a company. The user looks at past attempts to break into the company and evaluates the threats and exposures to create a report. Which type of risk analysis could the user perform?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsThe IT security personnel of an organization notice that the web server deployed in the DMZ is frequently targeted by threat actors. The decision is made to implement a patch management system to manage the server. Which risk management strategy method is being used to respond to the identified risk?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat is a MITRE ATT&CK framework?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementWhich meta-feature element in the Diamond Model describes tools and information (such as software, black hat knowledge base, username and password) that the adversary uses for the intrusion event?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementThe CEO of a company is concerned that if a data breach should occur and customer data is exposed, the company could be sued. The CEO makes the decision to buy insurance for the company. What type of risk mitigation is the CEO implementing?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsAccording to the Cyber Kill Chain model, after a weapon is delivered to a targeted system, what is the next step that a threat actor would take?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich penetration test phase is concerned with conducting reconnaissance to gain information about the target network or device?ITExamAnswers asked 2 years ago • Cyber Threat ManagementWhich NIST-defined incident response stakeholder is responsible for coordinating incident response with other stakeholders and minimizing the damage of an incident?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat is the first step in the risk management process that helps to reduce the impact of threats and vulnerabilities?ITExamAnswers asked 2 years ago • Cyber Threat ManagementCybersecurity professionals may have access to sensitive data. What one factor should they understand to help them make informed ethical decisions in relation to this data?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsWhich service is provided by the Cisco Talos Group?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementIn addressing an identified risk, which strategy aims to decrease the risk by taking measures to reduce vulnerability?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementYour risk manager just distributed a chart that uses three colors to identify the level of threat to key assets in the information security systems. Red represents high level of risk, yellow represents average level of threat and green represents low level of threat. What type of risk analysis does this chart represent?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsWhat network scanning tool has advanced features that allows it to use decoy hosts to mask the source of the scan?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat Management