IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhat are two purposes of launching a reconnaissance attack on a network? (Choose two.)IT Administrator asked 4 years ago • CCNA, CCNA CyberOpsHow is a DHCPDISCOVER transmitted on a network to reach a DHCP server?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, Networking EssentialsA device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the network identifier of the device?ITExamAnswers asked 4 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8Which method would an IPv6-enabled host using SLAAC employ to learn the address of the default gateway?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, Network Addressing and Basic TroubleshootingWhich two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Network Addressing and Basic TroubleshootingHow many usable IP addresses are available on the 192.168.1.0/27 network?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network Addressing and Basic TroubleshootingWhat type of route is created when a network administrator manually configures a route that has an active exit interface?IT Administrator asked 4 years ago • CCNA CyberOps, Network Addressing and Basic TroubleshootingWhich two commands can be used on a Windows host to display the routing table? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, Network Addressing and Basic TroubleshootingWhat is the first step in the CSMA/CA process when a wireless client is attempting to communicate on the wireless network?IT Administrator asked 4 years ago • CCNA CyberOps, Network Addressing and Basic TroubleshootingWhat is used on WLANs to avoid packet collisions?IT Administrator asked 4 years ago • CCNA CyberOps, Network Addressing and Basic TroubleshootingWhich LAN topology requires a central intermediate device to connect end devices?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network Addressing and Basic TroubleshootingWhen a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?IT Administrator asked 4 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8Which is an example of social engineering?ITExamAnswers asked 4 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8What contains information on how hard drive partitions are organized?ITExamAnswers asked 4 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8Which protocol is used by ping to test connectivity between network hosts?ITExamAnswers asked 2 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8, Networking Devices and Initial Configuration