IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network DefenseAfter a security audit for an organization, multiple accounts were found to have privileged access to systems and devices. Which three best practices for securing privileged accounts should be included in the audit report? (Choose three.)ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseA user has been asked to implement IPsec for inbound external connections. The user plans to use SHA-1 as part of the implementation. The user wants to ensure the integrity and authenticity of the connection. What security tool can the user use?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhich component is a pillar of the zero trust security approach that focuses on the secure access of devices, such as servers, printers, and other endpoints, including devices attached to IoT?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich type of access control applies the strictest access control and is commonly used in military or mission critical applications?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhen a security audit is performed at a company, the auditor reports that new users have access to network resources beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occurring?ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, Network DefenseAn organization plans to implement security training to educate employees about security policies. What type of access control is the organization trying to implement?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseMatch the type of multifactor authentication with the description.ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhich three processes are examples of logical access controls? (Choose three.)ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhat two steps should be taken before connecting any IoT device to a home or business network? (Choose 2.)ITExamAnswers asked 2 years ago • Network DefenseWhich technology can be used to protect VoIP against eavesdropping?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhich utility uses the Internet Control Messaging Protocol (ICMP)?ITExamAnswers asked 4 years ago • Cybersecurity Essentials, Network Defense, Networking Devices and Initial ConfigurationMutual authentication can prevent which type of attack?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhich service will resolve a specific web address into an IP address of the destination web server?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhy is WPA2 better than WPA?ITExamAnswers asked 4 years ago • CCNP, Cybersecurity Essentials, Network DefenseA user is running a routine audit of the server hardware in the company data center. Several servers are using single drives to host operating systems and multiple types of attached storage solutions for storing data. The user wants to offer a better solution to provide fault tolerance during a drive failure. Which solution is best?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network Defense