IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network Support and SecurityTo which component of the CIA triad security information principle does tokenization apply?ITExamAnswers asked 11 months ago • Network Support and SecurityMatch the authentication method to description.ITExamAnswers asked 11 months ago • IT Essentials 8, Network Support and SecurityMatch the type of firewall to the description.ITExamAnswers asked 11 months ago • Network Support and SecurityWhich attack takes control over a user’s mobile device and instructs the device to exfiltrate user-sensitive information and send it to threat actors?ITExamAnswers asked 11 months ago • Network Support and SecurityMatch the examples of cyber threat to the description.ITExamAnswers asked 11 months ago • IT Essentials 8, Network Support and SecurityThe IT department of a high school is developing cybersecurity policies. One policy item regulates the blocking of obtaining movies and sounds through peer-to-peer networks on school computers. Which two user threats does this policy address? (Choose two.)ITExamAnswers asked 11 months ago • Network Support and SecurityWhat type of connection is used when a teleworker must have secure access to devices and services located on an enterprise network?ITExamAnswers asked 11 months ago • IT Essentials 8, Network Support and SecurityWhich output of a ping command can determine two important pieces of information? (Choose two.)ITExamAnswers asked 11 months ago • Network Support and SecurityA network administrator needs to segment the local area network to isolate traffic from different departments so that network permissions unique to each department can be implemented. Which network topology provides a solution to achieve the objective?ITExamAnswers asked 11 months ago • Network Support and SecurityWhich type of cloud service is a user accessing when using Google Sheets to create a financial report?ITExamAnswers asked 11 months ago • Network Support and SecurityRefer to the exhibit. A technician is attempting to map the local network using CDP. According to the output shown, which two statements are true about router Branch01? (Choose two.)ITExamAnswers asked 11 months ago • Network Support and SecurityWhat statement describes the principle of integrity in the CIA information security triad?ITExamAnswers asked 11 months ago • Network Support and SecurityWhat statement describes the principle of confidentiality in the CIA information security triad?ITExamAnswers asked 11 months ago • Network Support and SecurityWhich Apple macOS security feature prevents the execution of malware through signature-based malware detection?ITExamAnswers asked 11 months ago • Network Support and SecurityWhich host-based solution is installed on a device or server to monitor system calls and file system access to detect malicious requests?ITExamAnswers asked 11 months ago • Network Support and Security