IT Questions Bank Mar 16, 2020 Last Updated: Apr 13, 2022 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsFilter:AllUnansweredSort byViewsAnswersVotesFor what purpose would a network administrator use the Nmap tool?ITExamAnswers asked 2 years ago • CCNA CyberOps, Introduction to CybersecurityThe IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?ITExamAnswers asked 2 years ago • IT Essentials, CCNA, CCNA CyberOps, Introduction to CybersecurityWhat type of attack uses zombies?ITExamAnswers asked 2 years ago • CCNA CyberOps, Introduction to CybersecurityWhen describing malware, what is a difference between a virus and a worm?ITExamAnswers asked 2 years ago • CCNA CyberOps, CCNA Security, Introduction to CybersecurityWhat is the main purpose of cyberwarfare?IT Administrator asked 2 years ago • CCNA CyberOps, Introduction to CybersecurityA company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?ITExamAnswers asked 2 years ago • CCNA CyberOps, Introduction to CybersecurityA web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?IT Administrator asked 2 years ago • CCNA CyberOps, CCNA Security, Introduction to CybersecurityWhich statement describes cybersecurity?ITExamAnswers asked 6 months ago • CCNA CyberOps, Introduction to CybersecurityWhy do IoT devices pose a greater risk than other computing devices on a network?ITExamAnswers asked 2 years ago • CCNA CyberOps, Introduction to CybersecurityWhat is the primary goal of a DoS attack?ITExamAnswers asked 2 years ago • IT Essentials, CCNA CyberOps, Introduction to CybersecurityWhich example illustrates how malware might be concealed?IT Administrator asked 2 years ago • CCNA CyberOps, Introduction to CybersecurityWhat is the most common goal of search engine optimization (SEO) poisoning?IT Administrator asked 2 years ago • CCNA CyberOps, Introduction to CybersecurityWhich tool is used to provide a list of open ports on network devices?ITExamAnswers asked 2 years ago • CCNA CyberOps, Introduction to CybersecurityWhat is the purpose of a rootkit?ITExamAnswers asked 2 years ago • CCNA CyberOps, Introduction to CybersecurityWhich type of attack allows an attacker to use a brute-force approach?ITExamAnswers asked 2 years ago • CCNA CyberOps, CCNA Security, Introduction to Cybersecurity