IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Cybersecurity EssentialsWhich two values are required to calculate annual loss expectancy? (Choose two.)ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity EssentialsEmployees in an organization report that they cannot access the customer database on the main server. Further investigation reveals that the database file is now encrypted. Shortly afterward, the organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cybersecurity Essentials, Endpoint Security, IT Essentials 8, Network Support and SecurityWhat do you call an impersonation attack that takes advantage of a trusted relationship between two systems?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, IT Essentials 8, Network Support and SecurityWhich type of networks poses increasing challenges to cybersecurity specialists due to the growth of BYOD on campus?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhat three tasks are accomplished by a comprehensive security policy? (Choose three.)ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity Essentials, Endpoint SecurityWhich of the following statements describes a distributed denial of service (DDoS) attack?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhat does a rootkit modify?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, Network Support and SecurityWhat are three states of data during which data is vulnerable? (Choose three.)ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhat principle prevents the disclosure of information to unauthorized people, resources, and processes?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityA cybercriminal sends a series of maliciously formatted packets to a database server, which causes the server to crash. What do you call this type of attack?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityA new PC is taken out of the box, started up and connected to the Internet. Patches were downloaded and installed. Antivirus was updated. In order to further harden the operating system what can be done?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhat is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, Network Support and SecurityWhat is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Cybersecurity Essentials, Endpoint Security, Network Support and Security, Networking EssentialsWhat does the term vulnerability mean?ITExamAnswers asked 4 years ago • Cybersecurity Essentials, Endpoint SecurityA security specialist is asked for advice on a security measure to prevent unauthorized hosts from accessing the home network of employees. Which measure would be most effective?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security