IT Questions Bank Mar 16, 2020 Last Updated: Apr 13, 2022 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Cybersecurity EssentialsAn investigator finds a USB drive at a crime scene and wants to present it as evidence in court. The investigator takes the USB drive and creates a forensic image of it and takes a hash of both the original USB device and the image that was created. What is the investigator attempting to prove about the USB drive when the evidence is submitted in court?ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network DefenseWhat is a strength of using a hashing function?ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network DefenseWhat term is used to describe concealing data in another file such as a graphic, audio, or other text file?ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network DefenseWhat term is used to describe the technology that replaces sensitive information with a nonsensitive version?ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network DefenseWhat Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?IT Administrator asked 2 years ago • IT Essentials, Cybersecurity Essentials, Network DefenseAfter a security audit for an organization, multiple accounts were found to have privileged access to systems and devices. Which three best practices for securing privileged accounts should be included in the audit report? (Choose three.)ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network DefenseA user has been asked to implement IPsec for inbound external connections. The user plans to use SHA-1 as part of the implementation. The user wants to ensure the integrity and authenticity of the connection. What security tool can the user use?ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network DefenseAn organization plans to implement security training to educate employees about security policies. What type of access control is the organization trying to implement?ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network DefenseMatch the type of multifactor authentication with the description.ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network DefenseWhich three processes are examples of logical access controls? (Choose three.)ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network DefenseWhich technology can be used to protect VoIP against eavesdropping?ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network DefenseWhich utility uses the Internet Control Messaging Protocol (ICMP)?ITExamAnswers asked 3 years ago • Cybersecurity Essentials, Network Defense, Networking Devices and Initial ConfigurationMutual authentication can prevent which type of attack?ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network DefenseA company wants to implement biometric access to its data center. The company is concerned with people being able to circumvent the system by being falsely accepted as legitimate users. What type of error is false acceptance?ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network DefenseWhich service will resolve a specific web address into an IP address of the destination web server?ITExamAnswers asked 10 months ago • Cybersecurity Essentials, Network Defense