IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich three IP addresses are private ? (Choose three.)ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Networking Basics, Networking EssentialsWhat is the primary goal of a DoS attack?ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, Introduction to CybersecurityFor what purpose would a network administrator use the Nmap tool?ITExamAnswers asked 4 years ago • CCNA CyberOps, Introduction to CybersecurityWhen describing malware, what is a difference between a virus and a worm?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Introduction to CybersecurityA company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?ITExamAnswers asked 4 years ago • CCNA CyberOps, Introduction to CybersecurityWhich statement describes cybersecurity?ITExamAnswers asked 2 years ago • CCNA CyberOps, Introduction to CybersecurityWhy do IoT devices pose a greater risk than other computing devices on a network?ITExamAnswers asked 4 years ago • CCNA CyberOps, Introduction to CybersecurityWhich example illustrates how malware might be concealed?IT Administrator asked 4 years ago • CCNA CyberOps, Introduction to CybersecurityWhich tool is used to provide a list of open ports on network devices?ITExamAnswers asked 4 years ago • CCNA CyberOps, Introduction to CybersecurityWhich type of attack allows an attacker to use a brute-force approach?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Introduction to CybersecurityIn what way are zombies used in security attacks?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Introduction to CybersecurityWhat is an example of “hacktivism”?ITExamAnswers asked 4 years ago • CCNA CyberOps, Introduction to CybersecurityWhat three items are components of the CIA triad? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA, CCNA Security, Introduction to CybersecurityWhich statement describes cyberwarfare?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, Introduction to CybersecurityWhat is indicated by a Snort signature ID that is below 3464?IT Administrator asked 4 years ago • CCNA CyberOps, Network Defense