IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA 3 v7What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)ITExamAnswers asked 4 years ago • CCNA 2 v6, CCNA 2 v7, CCNA 3 v7Which network device can be used to eliminate collisions on an Ethernet network?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v6, CCNA 3 v7What is one function of a Layer 2 switch?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v6, CCNA 3 v7, DevNet, Networking BasicsA local law firm is redesigning the company network so that all 20 employees can be connected to a LAN and to the Internet. The law firm would prefer a low cost and easy solution for the project. What type of switch should be selected?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v6, CCNA 3 v7Which two previously independent technologies should a network administrator attempt to combine after choosing to upgrade to a converged network infrastructure? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v6, CCNA 3 v7A program sends a flood of UDP packets from a spoofed host to a server on the subnet sweeping through all the known UDP ports looking for closed ports. This will cause the server to reply with an ICMP port unreachable message. Which attack is this?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack is being used when the threat actor spoofs the IP address of one host, predicts the next sequence number, and sends an ACK to the other host?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateTwo hosts have established a TCP connection and are exchanging data. A threat actor sends a TCP segment with the RST bit set to both hosts informing them to immediately stop using the TCP connection. Which attack is this?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack exploits the three-way handshake?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack being used is when a threat actor creates packets with false source IP address information to either hide the identity of the sender, or to pose as another legitimate user?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack is being used when threat actors use pings to discover subnets and hosts on a protected network, to generate flood attacks, and to alter host routing tables?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack is being used when threat actors initiate a simultaneous, coordinated attack from multiple source machines?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack is being used when threat actors gain access to the physical network, and then use an MiTM attack to capture and manipulate a legitimate user’s traffic?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack is being used when threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhat type of attack is port scanning?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps Associate, Network Security 1.0