IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Cyber Threat ManagementWhich two classes of metrics are included in the CVSS Base Metric Group? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementThe laptop of an attacker is attached to a corporate network. The attacker is examining all of the network traffic that is passing through the network interface card. Which network reconnaissance method does this scenario describe?ITExamAnswers asked 2 years ago • Cyber Threat ManagementAccording to NIST, which step in the digital forensics process involves identifying potential sources of forensic data, its acquisition, handling, and storage?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementAn organization has hired a former hacker to test how well the organization would tolerate a real attack by using malicious techniques. What type of testing is the hacker performing for the organization?ITExamAnswers asked 2 years ago • Cyber Threat ManagementWhich type of security control includes backup and restore operations, as well as fault-tolerant data storage?ITExamAnswers asked 2 years ago • Cyber Threat ManagementA breach occurs in a company that processes credit card information. Which industry specific law governs credit card data protection?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsA cybersecurity analyst is performing a CVSS assessment on an attack where a web link was sent to several employees. Once clicked, an internal attack was launched. Which CVSS Base Metric Group Exploitability metric is used to document that the user had to click on the link in order for the attack to occur?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich network security tool can detect open TCP and UDP ports on most versions of Microsoft Windows?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat is the purpose of the policy element in a computer security incident response capability of an organization, as recommended by NIST?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat will a threat actor do to create a back door on a compromised target according to the Cyber Kill Chain model?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementAn organization is developing a data governance program that follows regulations and policies. Which role in the program is responsible for ensuring compliance with policies and procedures, assigning the proper classification to information assets, and determining the criteria for accessing information assets?IT Administrator asked 10 months ago • Cyber Threat ManagementWhat type of exercise interrupts services to verify that all aspects of a business continuity plan are able to respond to a certain type of incident?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsHow does network scanning help assess operations security?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Cyber Threat ManagementWhich approach provides automated tools allowing an organization to collect data about security threats from various sources?ITExamAnswers asked 2 years ago • Cyber Threat ManagementWhat do penetration tests and red team exercises achieve?ITExamAnswers asked 2 years ago • Cyber Threat Management