IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Cyber Threat ManagementWhat network testing tool is used for password auditing and recovery?IT Administrator asked 3 years ago • CCNA Security, Cyber Threat ManagementA new person has joined the security operations team for a manufacturing plant. What is a common scope of responsibility for this person?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat network security testing tool has the ability to provide details on the source of suspicious network activity?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementA new technician was overheard telling colleagues that a secure network password had been discovered through a search of social media sites. What technique was used to acquire the password?ITExamAnswers asked 2 years ago • Cyber Threat ManagementWhich cybersecurity weapon scans for use of default passwords, missing patches, open ports, misconfigurations, and active IP addresses?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsAn administrator is troubleshooting NetBIOS name resolution on a Windows PC. What command line utility can be used to do this?ITExamAnswers asked 2 years ago • Cyber Threat ManagementWhat is the purpose of the Tripwire network testing tool?IT Administrator asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat is the primary goal of IT security governance?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsWhat law protects the privacy of an employee’s personal information from being shared with third parties?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsWhich of the following frameworks identifies controls based on the latest information about common cyber attacks and provides benchmarks for various platforms?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsThe ability to carry out highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence is covered in what category of the National Cybersecurity Workforce Framework?ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsAn organization has experienced several incidents involving employees downloading unauthorized software and using unauthorized websites and personal USB devices. What measures could the organization implement to manage these threats? (Choose three correct answers)ITExamAnswers asked 2 years ago • Cyber Threat ManagementAccording to NIST standards, which incident response stakeholder is responsible for coordinating an incident response with other stakeholders to minimize the damage of an incident?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementA threat actor has identified the potential vulnerability of the web server of an organization and is building an attack. What will the threat actor possibly do to build an attack weapon?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementMatch the security incident stakeholder with the role.ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat Management