IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Endpoint SecurityAn employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityFor which discovery mode will an AP generate the most traffic on a WLAN?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA, Endpoint SecurityWhat is a characteristic of a DNS amplification and reflection attack?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint SecurityIn which type of attack is falsified information used to redirect users to malicious Internet sites?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Endpoint SecurityWhich protocol would be the target of a cushioning attack?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich type of DNS attack involves the cybercriminal compromising a parent domain and creating multiple subdomains to be used during the attacks?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA, Endpoint SecurityWhat is an objective of a DHCP spoofing attack?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint SecurityWhich action best describes a MAC address spoofing attack?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint SecurityHow is optional network layer information carried by IPv6 packets?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityIn which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Endpoint SecurityWhich type of attack involves the unauthorized discovery and mapping of network systems and services?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint SecurityWhat is involved in an IP address spoofing attack?IT Administrator asked 3 years ago • CCNA, CCNA CyberOps, CCNA Security, Endpoint SecurityWhich field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Networking Devices and Initial ConfigurationWhich type of evidence cannot prove an IT security fact on its own?ITExamAnswers asked 4 years ago • CCNA CyberOps