IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA 1 v7Which LAN topology has all end systems chained to each other and terminated at the end?IT Administrator asked 2 hours ago • CCNA 1 v7What kind of physical networks are commonly used in WANs? (Choose three.)IT Administrator asked 2 hours ago • CCNA 1 v7Which two commands would return you to the privileged EXEC prompt regardless of the configuration mode you are in? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking EssentialsWhich IOS mode are you in if the Switch> prompt is displayed?ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking EssentialsWhich IOS mode are you in if the Switch(config)# prompt is displayed?ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking EssentialsWhich IOS mode allows access to all commands and features?ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking EssentialsWhat kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking EssentialsWhat kind of threat is described when a threat actor is stealing the user database of a company?ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking EssentialsWhat kind of threat is described when a threat actor alters data records?ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking EssentialsWhat kind of threat is described when a threat actor overloads a network to deny other users network access?ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking EssentialsWhat kind of threat is described when a threat actor steals scientific research data?ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking EssentialsWhat kind of threat is described when a threat actor prevents legal users from accessing data services?ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking EssentialsWhat kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking EssentialsWhat kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking EssentialsWhich is a feature of IMAP?ITExamAnswers asked 2 years ago • CCNA 1 v7, Networking Essentials