IT Questions Bank What three methods help to ensure system availability? (Choose three.)ITExamAnswers asked 2 years ago • Endpoint SecurityMatch the antimalware approach to the description.ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich of the following are types of sensitive information? (Choose three.)ITExamAnswers asked 10 months ago • Endpoint SecurityAn organization allows employees to work from home two days a week. Which technology should be implemented to ensure data confidentiality as data is transmitted?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhat is a method of sending information from one device to another using removable media?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhat name is given to a storage device connected to a network?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhich two methods help to ensure data integrity? (Choose two.)ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhat type of cybersecurity laws protect you from an organization that might want to share your sensitive data?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhat is identified by the first dimension of the cybersecurity cube?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhat type of lock is recommended to secure an office door?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhich type of technology can prevent malicious software from displaying unwanted popup ads on a device?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhat can you do to ensure that network operating software remains secure? (Choose three correct answers)ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhich security endpoint setting would be used by a security analyst to determine if a computer has been configured to prevent a particular application from running?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityAs described by the SANS Institute, which attack surface includes the use of social engineering?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat is a host-based intrusion detection system (HIDS)?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint Security