IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Introduction to CybersecurityWhich of the following methods can be used to ensure confidentiality of information? (Choose three correct answers)ITExamAnswers asked 2 years ago • Introduction to Cybersecurity‘Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.’ Is this statement true or false?IT Administrator asked 2 years ago • Introduction to CybersecurityA port scan returns a ‘dropped’ response. What does this mean?IT Administrator asked 2 years ago • Introduction to CybersecurityWhich of the following firewalls filters web content requests such as URLs and domain names?IT Administrator asked 2 years ago • Introduction to CybersecurityWhich of the following firewalls filters traffic based on source and destination IP addresses?IT Administrator asked 2 years ago • Introduction to CybersecurityIf developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?IT Administrator asked 2 years ago • Introduction to CybersecurityWhat do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995? (Select two correct answers)IT Administrator asked 2 years ago • Introduction to CybersecurityWhat vulnerability occurs when the output of an event depends on ordered or timed outputs?IT Administrator asked 2 years ago • Introduction to CybersecurityWhich of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?IT Administrator asked 2 years ago • Introduction to CybersecurityWhat is the main function of the Cisco Security Incident Response Team?IT Administrator asked 2 years ago • Introduction to CybersecurityYou are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?IT Administrator asked 2 years ago • Introduction to CybersecurityWhat is the best way to avoid getting spyware on a machine?IT Administrator asked 2 years ago • Introduction to CybersecurityAn organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?IT Administrator asked 2 years ago • Introduction to CybersecurityWhat are the objectives of ensuring data integrity? (Choose two correct answers)IT Administrator asked 2 years ago • Introduction to Cybersecurity