IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhat procedure should be avoided in a digital forensics investigation?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cybersecurity EssentialsWhat is a difference between symmetric and asymmetric encryption algorithms?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Cybersecurity EssentialsWhich three IP addresses are considered private addresses? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Networking EssentialsWhat technique is used in social engineering attacks?ITExamAnswers asked 4 years ago • CCNA CyberOps, Networking EssentialsWhat is the function of ARP?ITExamAnswers asked 4 years ago • CCNA CyberOps, Networking EssentialsA network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?ITExamAnswers asked 4 years ago • CCNA CyberOps, Networking EssentialsWhich statement describes a characteristic of cloud computing?ITExamAnswers asked 4 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8, Networking EssentialsWhat is the well-known port address number used by DNS to serve requests?IT Administrator asked 4 years ago • CCNA CyberOps, Networking EssentialsWhy does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?ITExamAnswers asked 4 years ago • CCNA CyberOps, Networking Devices and Initial Configuration, Networking EssentialsWhich two devices would commonly be found at the access layer of the hierarchical enterprise LAN design model? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNP, Networking Devices and Initial Configuration, Networking EssentialsWhat information does an Ethernet switch examine and use to build its address table?ITExamAnswers asked 4 years ago • CCNA CyberOps, Networking Basics, Networking EssentialsWhich statement describes a MAC address?IT Administrator asked 3 years ago • CCNA CyberOps, Networking EssentialsWhat is the Internet?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Networking Basics, Networking EssentialsWhat are the two sizes (minimum and expected maximum) of an Ethernet frame? (Choose two.)IT Administrator asked 1 year ago • CCNA CyberOpsMatch the phase in the NIST incident response life cycle to the action.ITExamAnswers asked 4 years ago • CCNA CyberOps, CyberOps Associate