IT Questions Bank Mar 16, 2020 Last Updated: Apr 13, 2022 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Cybersecurity EssentialsFilter:AllUnansweredSort byViewsAnswersVotesWhich utility uses the Internet Control Messaging Protocol (ICMP)?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Networking Devices and Initial ConfigurationYour risk manager just distributed a chart that uses three colors to identify the level of threat to key assets in the information security systems. Red represents high level of risk, yellow represents average level of threat and green represents low level of threat. What type of risk analysis does this chart represent?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsAn organization has implemented antivirus software. What type of security control did the company implement?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsIf a person knowingly accesses a government computer without permission, what federal act laws would the person be subject to?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsWhich framework should be recommended for establishing a comprehensive information security management system in an organization?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsWhat are three disclosure exemptions that pertain to the FOIA? (Choose three.)ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsWhich type of controls restore the system after a disaster or an event?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsWhat type of exercise interrupts services to verify that all aspects of a business continuity plan are able to respond to a certain type of incident?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsKeeping data backups offsite is an example of which type of disaster recovery control?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsWhich risk mitigation strategies include outsourcing services and purchasing insurance?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsIn which situation would a detective control be warranted?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsThe team is in the process of performing a risk analysis on the database services. The information collected includes the initial value of these assets, the threats to the assets and the impact of the threats. What type of risk analysis is the team performing by calculating the annual loss expectancy?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsA security professional is asked to perform an analysis of the current state of a company network. What tool would the security professional use to scan the network only for security risks?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsAs part of HR policy in a company, an individual may opt-out of having information shared with any third party other than the employer. Which law protects the privacy of personal shared information?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity EssentialsA breach occurs in a company that processes credit card information. Which industry specific law governs credit card data protection?ITExamAnswers asked 3 months ago • Cyber Threat Management, Cybersecurity Essentials