IT Questions Bank An online store has set a control objective to maintain the highest level of website availability. Which two possible control mechanisms should the online store implement? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsAn organization is implementing security requirements for teleworkers to access the corporate network. What are two examples of technical control for the implementation? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA user wants to store data where it is accessible from any computer with internet access. What storage technology meets the needs of the user?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat is a function of a protocol analyzer?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat is an example of a business continuity plan?ITExamAnswers asked 2 years ago • Cybersecurity EssentialsWhich of the following is the simplest exercise to use for training employees and testing an organization’s disaster recovery plan?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsIn which phase of the NIST Incident Response Life Cycle are the vulnerabilities that have been exploited by the attacker corrected and patched?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA cybersecurity team needs to investigate several incidents. In which step of the NIST incident response life cycle are the tools and assets, required to do this investigation, acquired and deployed?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat procedure should be avoided in a digital forensics investigation?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cybersecurity EssentialsForensic procedures must be followed exactly to ensure the integrity of data obtained in an investigation. When making copies of data from a machine that is being examined, which of the following should be done to ensure it is an exact duplicate?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA cybersecurity technician sets up a honeypot within a separate DMZ of the enterprise network. What is the purpose of doing this?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsThe IT security team of an organization is charged with cybersecurity threat assessment and risk management. Which Cisco service would assist the task by providing information about security incident detection rule sets for the Snort.org, ClamAV, and SpamCop network security tools?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsMatch the criteria for the Base Metric Group Exploitability metrics with its description.ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhen using a CVSS risk assessment tool, what must be completed first in order for a score to be calculated for the Temporal Metric Group?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA penetration tester wants to collect preliminary knowledge about systems, software, networks, or people without directly engaging the target or its assets. What is this process called?ITExamAnswers asked 1 year ago • Cybersecurity Essentials