IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsA web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Introduction to CybersecurityWhy would a manager need to use the tracert command?IT Administrator asked 4 years ago • CCNA CyberOps, IT Essentials 8Which statement describes the policy-based intrusion detection approach?IT Administrator asked 4 years ago • CCNA CyberOpsMatch the intrusion event defined in the Diamond Model of intrusion to the description.IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat are the three impact metrics contained in the CVSS 3.0 Base Metric Group? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementMatch the network profile element to the description. (Not all options are used.)IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementEmployees in an organization report that they cannot access the customer database on the main server. Further investigation reveals that the database file is now encrypted. Shortly afterward, the organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cybersecurity Essentials, Endpoint Security, IT Essentials 8, Network Support and SecurityA threat actor wants to interrupt a normal TCP communication between two hosts by sending a spoofed packet to both endpoints. Which TCP option bit would the threat actor set in the spoofed packet?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IoT SecurityAn attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Endpoint SecurityWhich HIDS is an open-source based product?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint SecurityWhich device can control and manage a large number of corporate APs?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich user can override file permissions on a Linux computer?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich technology is used by Cisco Advanced Malware Protection (AMP) in defending and protecting against known and emerging threats?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich method can be used to harden a device?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security