IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA 1 v7This zone is used to house servers that should be accessible to outside users.ITExamAnswers asked 2 years ago • CCNA 1 v7Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data?ITExamAnswers asked 2 years ago • CCNA 1 v7Which device is used by other network devices to authenticate and authorize management access?ITExamAnswers asked 2 years ago • CCNA 1 v7Which device controls traffic between two or more networks to help prevent unauthorized access?ITExamAnswers asked 2 years ago • CCNA 1 v7Sharon, an IT intern at ACME Inc., noticed some strange packets while revising the security logs generated by the firewall. A handful of IP addresses on the internet were sending malformed packets to several different IP addresses, at several different random port numbers inside ACME Inc. What type of attack is described in this scenario?ITExamAnswers asked 2 years ago • CCNA 1 v7A computer is used as a print server for ACME Inc. The IT staff failed to apply security updates to this computer for over 60 days. Now the print server is operating slowly, and sending a high number of malicious packets to its NIC. What type of attack is described in this scenario?ITExamAnswers asked 2 years ago • CCNA 1 v7Arianna found a flash drive lying on the pavement of a mall parking lot. She asked around but could not find the owner. She decided to keep it and plugged it into her laptop, only to find a photo folder. Feeling curious, Arianna opened a few photos before formatting the flash drive for her own use. Afterwards, Arianna noticed that her laptop camera was active. What type of attack is described in this scenario?ITExamAnswers asked 2 years ago • CCNA 1 v7Jeremiah was browsing the internet from his personal computer when a random website offered a free program to clean his system. After the executable was downloaded and running, the operating system crashed. Crucial operating system related files had been corrupted and Jeremiah’s computer required a full disk format and operating system re-installation. What type of attack is described in this scenario?ITExamAnswers asked 2 years ago • CCNA 1 v7George needed to share a video with a co-worker. Because of the large size of the video file, he decided to run a simple FTP server on his workstation to serve the video file to his co-worker. To make things easier, George created an account with the simple password of “file” and provided it to his co-worker on Friday. Without the proper security measures or a strong password, the IT staff was not surprised to learn on Monday that George’s workstation had been compromised and was trying to upload work related documents to the internet. What type of attack is described in this scenario?ITExamAnswers asked 2 years ago • CCNA 1 v7Angela, an IT staff member at ACME Inc., notices that communication with the company’s web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME’S web server. What type of attack is described in this scenario?ITExamAnswers asked 2 years ago • CCNA 1 v7True or false? Resource sharing over SMB is only supported on Microsoft operating systems.ITExamAnswers asked 2 years ago • CCNA 1 v7Which of these ports are used by FTP? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 1 v7True or false? FTP data transfers take place from client to server (push) and from server to client (pull).ITExamAnswers asked 2 years ago • CCNA 1 v7How many connections are required by FTP between client and server?ITExamAnswers asked 2 years ago • CCNA 1 v7Which of the following DNS resource record types resolves authoritative name servers?ITExamAnswers asked 2 years ago • CCNA 1 v7