IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Introduction to CybersecurityWhich two characteristics describe a worm? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, CCNA Security, Introduction to CybersecurityWhat is a security playbook?ITExamAnswers asked 2 years ago • Introduction to CybersecurityCan you identify the cyber attacker type from the following descriptions?IT Administrator asked 2 years ago • Introduction to CybersecurityCarrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what?IT Administrator asked 2 years ago • Introduction to CybersecurityWhich of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?IT Administrator asked 2 years ago • Introduction to CybersecurityWhich of the statements correctly describes cybersecurity?ITExamAnswers asked 8 months ago • Introduction to CybersecurityWhich of the following is an example of two factor authentication?ITExamAnswers asked 2 years ago • Introduction to CybersecurityWhat action will an IDS take upon detection of malicious traffic?ITExamAnswers asked 2 years ago • Introduction to CybersecurityWhich of the following are commonly used port scanning applications? (Select two correct answers)IT Administrator asked 2 years ago • Introduction to CybersecurityWhat tool is used to lure an attacker so that an administrator can capture, log, and analyze the behavior of the attack?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Introduction to CybersecurityWhat type of attack disrupts services by overwhelming network devices with bogus traffic?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Introduction to CybersecurityWhich type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer?ITExamAnswers asked 2 years ago • Introduction to Cybersecurity, Networking EssentialsAn organization’s process of identifying and assessing risk with the goal of reducing these threats to an acceptable level is known as what?IT Administrator asked 1 year ago • Introduction to CybersecurityWhat is an example of cyber kill chain?IT Administrator asked 1 year ago • Introduction to CybersecurityAs data is being stored on a local hard disk, which method would secure the data from unauthorized access?IT Administrator asked 3 years ago • CCNA Security, Introduction to Cybersecurity, IT Essentials, IT Essentials 8