IT Questions Bank Match the network testing tool with its description.ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA cloud service company forms a security team to handle risks of disruption of cloud services caused by cyber-attacks. What should the team do first in the risk management process?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA Linux administrator creates new user accounts using the useradd command. Which two files on the system contain the new user account information? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsAn e-commerce website encourages users to authenticate using their individual social media account credentials. What type of a security solution enables users to use the same credentials to login to multiple networks belonging to different enterprises?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsRefer to the exhibit. The help desk receives a work order describing an issue with a management application running on PC-B. The work order states that the network management application cannot receive syslog messages from the LAN switch after upgrading PC-B to the latest version of Windows 10. A ping request from PC-A to PC-B fails, but both PCs are able to successfully ping the connected switch VLAN1 IP address. The technician temporarily disables the Windows Defender Firewall on PC-B for both the private and public networks. The ping request from PC-A to PC-B succeeds and the application on PC-B can receive the syslog messages from the switch. Which action should the technician perform to correct the reported issue without compromising the security of the LAN?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsRefer to the exhibit. What type of software is installed on the host system to support the three virtual machines?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Networking Devices and Initial ConfigurationWhat is a benefit of a Type 1 hypervisor implementation over a Type 2 hypervisor environment?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA software company uses a public cloud service for hosting development and deployment services. The company is evaluating options to protect against data breaches and compromised login credentials. What two countermeasures should be implemented? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA software company uses a public cloud service for hosting software development and deployment services. The company is concerned that software code in development might leak to competitors and result in the loss of intellectual property. Which two security coding techniques can the company implement to address the concern? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat are the most effective ways to defend against malware? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsAn organization needs a solution that will generate alerts on malware that has made it through the network perimeter and infected internal systems. What technology would be an appropriate solution for the organization?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat is a feature of the ANY.RUN malware sandbox?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA cyberanalyst is looking for an open source malware analysis tool that can run locally on the network. Which tool would meet the needs of the cyberanalyst?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat is used by PKI entities to verify the validity of a digital certificate?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat is a drawback of using a single-root PKI topology?ITExamAnswers asked 1 year ago • Cybersecurity Essentials