IT Questions Bank A company conducted a penetration test 6 months ago. However, they have acquired new firewalls and servers to strengthen the network and increase capacity. Why would an administrator request a new penetration test?ITExamAnswers asked 10 months ago • Ethical HackerWhich type of threat actors use cybercrime attacks to promote what they believe in?ITExamAnswers asked 10 months ago • Ethical HackerWhich are two best practices used to secure APIs? (Choose two.)ITExamAnswers asked 10 months agoAn OSPF router has three directly connected networks; 10.0.0.0/16, 10.1.0.0/16, and 10.2.0.0/16. Which OSPF network command would advertise only the 10.1.0.0 network to neighbors?ITExamAnswers asked 4 years ago • CCNAAn OSPF router has three directly connected networks; 172.16.0.0/24, 172.16.1.0/24, and 172.16.2.0/24. Which OSPF network command would advertise only the 172.16.1.0 network to neighbors?IT Administrator asked 10 months ago • CCNAAn OSPF router has three directly connected networks; 172.16.0.0/16, 172.16.1.0/16, and 172.16.2.0/16. Which OSPF network command would advertise only the 172.16.1.0 network to neighbors?ITExamAnswers asked 4 years ago • CCNAA technician needs to purchase a storage drive that both connects directly to the PCIe bus and provides reliability. Which type of storage device would best meet these requirements?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8A company is preparing for an ISMS audit. Match the right control for each control objective.IT Administrator asked 10 months ago • Cyber Threat ManagementWhich type of controls help uncover new potential threats?ITExamAnswers asked 2 years ago • Cybersecurity EssentialsWhat key considerations does a business impact analysis (BIA) examine? Choose four correct answersIT Administrator asked 12 months ago • Cybersecurity EssentialsWhich type of evidence cannot prove an IT security fact on its own?ITExamAnswers asked 4 years ago • CCNA CyberOpsMatch the folders in a 64-bit Windows 10 PC to their description. (Not all options are used.)ITExamAnswers asked 2 years ago • IT Essentials 8Which layer of the hierarchical design model provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network?ITExamAnswers asked 2 years ago • CCNA 3 v4, Networking Devices and Initial ConfigurationWhich statement accurately describes a Type 2 hypervisor?IT Administrator asked 10 months ago • Networking Devices and Initial ConfigurationHow many bits make up the single IPv6 hextet :10CD:?IT Administrator asked 3 years ago • Networking Essentials