IT Questions Bank A cybersecurity consulting company is helping an organization to develop a cybersecurity policy to address a few operational issues and conditions that may require more detailed requirements and directions. Which type of cybersecurity policy are they developing?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA company provides service to process transaction data for clients. The company deals with sensitive customer information of their clients. The improper release of the information poses a serious risk to the business of the company and their clients. The information security team in the company identifies threats coming from accidentally emailing the information to an unintended party. Which two action plans could the company implement to eliminate the risk? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA company has set a policy that employees will be required to report any observed or suspected security issues. Which control type has the company implemented?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsThe IT team of an organization is updating the policy and procedures regarding recovery controls. What are three examples of recovery controls? (Choose three.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat technology can be used to protect the integrity of data in transit?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhich data type is protected through the use of an IPsec VPN?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat is a characteristic of the security onion analogy to visualizing defense-in-depth?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA DHCP configured PC boots up. What is the order of the messages that are sent and received by this PC in order to obtain an appropriate IP address?ITExamAnswers asked 3 years ago • Networking Devices and Initial Configuration, Networking EssentialsWhich statement describes the relationship of a physical network and logical IPv4 addressed networks?ITExamAnswers asked 3 years ago • Networking Basics, Networking EssentialsWhat command will prevent all unencrypted passwords from displaying in plain text in a configuration file?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, Networking EssentialsRefer to the exhibit. A TCP segment was sent by PC1 to the web server via port 80. Because of an unexpected network failure, the data was forwarded by R1 but was not received by R2. Which statement is correct about this scenario?ITExamAnswers asked 3 years ago • Networking Basics, Networking EssentialsA router receives an incoming packet and cannot determine where to forward it. What will the router do?ITExamAnswers asked 3 years ago • Networking EssentialsWhich logical binary operation is used by a network device to determine the network portion of an IPv4 address with a specified subnet mask?ITExamAnswers asked 3 years ago • Networking EssentialsA student is sending files from a phone to a computer across a network. Which layer of the TCP/IP model is responsible for reassembling these messages as they are received on the computer?ITExamAnswers asked 3 years ago • Networking Basics, Networking EssentialsA network engineer working at a community building that provides free WiFi is holding an IT conference tomorrow evening. A previous conference with over 100 attendees just ended less than 24 hours ago and the network engineer is concerned about the availability of dynamic addressing. How will the network engineer ensure that there are enough IP addresses for the attendees arriving at the IT conference tomorrow?ITExamAnswers asked 3 years ago • Networking Essentials