IT Questions Bank Refer to the exhibit. What type of traffic will the policy be applied to when the router is configured with the class-map and policy-map shown?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat are three actions taken in the Detection & Analysis phase of the NIST Incident Response Life Cycle? (Choose three.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA network technician is charged with researching and collecting information regarding recent cybersecurity incidents. The technician decides to start with web sites that are opensource intelligence (OSINT). Which two statements describes OSINT types of web sites? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhich parameter is used to identify applications when a user sends a service request to a remote server?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, IoT SecurityWhat security tool allows an organization to collect data about security threats from various sources, and respond to low-level events without human intervention?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA small company uses a public cloud service provider to host an online store. The online store uses a web application as the front end and a database as the backend. When a customer places an order in the web form, the request is then sent to the database to check the inventory, current price, and customer information thereby completing the order. The IT manager is learning that threat attackers may launch attacks by injecting malformed data into the web application. What is a security coding technique that the company can use to minimize such attacks?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat statement describes a function that the Diffie-Hellman algorithm provides to IPsec VPNs?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsAn organization needs to implement a solution that would enable them to determine the order of security events occurring on the network. What technology should be implemented?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA network administrator notices that several company wireless access points are using WEP for encryption and authentication. The administrator needs to update the encryption and authentication configurations. Which security policy would address the process of updating AP configurations?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhich control should an organization use to restore a system back to its normal state?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsThe administrator of a Linux server uses the chmod 777 /usr/phones.txt command to assign permissions to a file that contains the company phone directory. What permissions are assigned with this command?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA network technician is preparing a number of laptops to be loaned to employees while they are traveling. These employees will not be logging into the corporate directory server when they are away from the office. Which type of software should be configured on the laptops in order to filter incoming and outgoing network connections?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat type of cipher encrypts plaintext one byte or one bit at a time?ITExamAnswers asked 2 years ago • Cybersecurity EssentialsThe results of an audit on cybersecurity practices revealed that several company servers were not updated with the latest patches. The audit also revealed that several user accounts had escalated privileges and were allowed unauthorized network resource access. Which two security policies should be enforced to address these issues? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsMatch the security control type to the appropriate description.IT Administrator asked 2 years ago • Cybersecurity Essentials