IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsA flood of packets with invalid source IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack has occurred?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich term is used for bulk advertising emails flooded to as many end users as possible?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat is the purpose of the cd\ command?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsAs described by the SANS Institute, which attack surface includes the exploitation of vulnerabilities in wired and wireless protocols used by IoT devices?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat would be displayed if the netstat -abno command was entered on a Windows PC?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsA client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, IT Essentials 8, Networking Basics, Networking Essentials, Operating Systems BasicsWhich two attacks target web servers through exploiting possible vulnerabilities of input functions used by an application? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, DevNet, Endpoint SecurityWhat is the result of a DHCP starvation attack?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityIn Windows Firewall, when is the Domain profile applied?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityConsider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich statement describes a VPN?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Endpoint SecurityWhat is the motivation of a white hat attacker?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint Security, Introduction to CybersecurityWhich wireless parameter refers to the frequency bands used to transmit data to a wireless access point?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich antimalware software approach can recognize various characteristics of known malware files to detect a threat?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityA threat actor uses a program to launch an attack by sending a flood of UDP packets to a server on the network. The program sweeps through all of the known ports trying to find closed ports. It causes the server to reply with an ICMP port unreachable message and is similar to a DoS attack. Which two programs could be used by the threat actor to launch the attack? (Choose two.)ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IoT Security