IT Questions Bank What tool is used to lure an attacker so that an administrator can capture, log, and analyze the behavior of the attack?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Introduction to CybersecurityWhat is the purpose of penetration testing?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA cloud service company provides web service to clients. The company is assessing the risk of service disruption due to hardware failure. The company decides to add another data center in a different building. Which risk management action level is the company implementing?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA network security technician is configuring account settings on Windows laptops that will be used by employees from their homes. Which Local Security Policy setting can prevent or discourage brute-force password attacks?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA network technician is assigned the task of hardening a Cisco switch before placing it into the LAN. The technician configures and encrypts the user and privilege mode passwords, creates a new management VLAN, and verifies that the IOS is up-to-date. What action should the technician take to ensure that remote access to the system is secure during transmission?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhich type of DNS attack involves a threat actor creating multiple bogus sub-domains under a legitimate parent domain?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA SOHO company is planning to use public cloud computing for hosting an online ordering application. The company is evaluating options to prevent sensitive data loss from cloud storage. What two countermeasures could be implemented to address the issue? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsYou are asked for advice on how to best prevent unauthorized hosts from accessing the home network of employees. Which of the following security measures do you think would be most effective?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Cybersecurity EssentialsRefer to the exhibit. The wireless router firewall is configured as shown. What action will be taken when packets that originate from the internet and have a destination IP address of 192.168.1.101 are received by the firewall?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat type of activity occurs during the deployment phase of the asset lifecycle?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsMatch the alert classification to the description.ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhich two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, Cybersecurity Essentials, IT Essentials 8, Networking EssentialsWhy does an organization need to conform to a standard data governance framework?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsRefer to the exhibit. A specialist in the information security team is reviewing the Webroot threat report 2020. Based on the findings in the report, what is a technique used by ransomware attackers that results in making it more difficult for legal teams to track their activities?ITExamAnswers asked 1 year ago • Cybersecurity Essentials