IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Cyber Threat ManagementWhen establishing a network profile for an organization, which element describes the time between the establishment of a data flow and its termination?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat act protects the personal information of students in schools?ITExamAnswers asked 2 years ago • Cyber Threat ManagementMatch the network security testing tool with the correct function. (Not all options are used.)ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementIn which step of the NIST incident response process does the CSIRT perform an analysis to determine which networks, systems, or applications are affected; who or what originated the incident; and how the incident is occurring?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementA company is preparing for an ISMS audit. Match the right control for each control objective.IT Administrator asked 10 months ago • Cyber Threat ManagementWhich statement describes the Cyber Kill Chain?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementAccording to NIST, which step in the digital forensics process involves extracting relevant information from data?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementA threat actor has gained administrative access to a system and achieved the goal of controlling the system for a future DDoS attack by establishing a communication channel with a CnC owned by the threat actor. Which phase in the Cyber Kill Chain model describes the situation?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementThe company you work for has asked you to create a broad plan that includes DRP and getting critical systems to another location in case of disaster. What type of plan are you being asked to create?ITExamAnswers asked 2 years ago • Cyber Threat ManagementAfter a threat actor completes a port scan of the public web server of an organization and identifies a potential vulnerability, what is the next phase for the threat actor in order to prepare and launch an attack as defined in the Cyber Kill Chain?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementA user is asked to create a disaster recovery plan for a company. The user needs to have a few questions answered by management to proceed. Which three questions should the user ask management as part of the process of creating the plan? (Choose three.)ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsWhich two actions can help identify an attacking host during a security incident? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich access control should the IT department use to restore a system back to its normal state?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsA user is asked to perform a risk analysis of a company. The user asks for the company asset database that contains a list of all equipment.The user uses this information as part of a risk analysis. Which type of risk analysis could be performed?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsA public cloud service company provides data storage services to multiple customers. The company decides to purchase an insurance policy to cover the data loss due to natural disasters. Which risk management action level has the service company taken to manage the potential risk?ITExamAnswers asked 2 years ago • Cyber Threat Management