IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsMatch the characteristic to the method of security analysis.ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich classification indicates that an alert is verified as an actual security incident?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat information is contained in the options section of a Snort rule?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich two services are provided by the NetFlow tool? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseHow does a web proxy device provide data loss prevention (DLP) for an enterprise?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseA system administrator runs a file scan utility on a Windows PC and notices a file lsass.exe in the Program Files directory. What should the administrator do?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich Cisco appliance can be used to filter network traffic contents to report and deny traffic based on the web server reputation?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseMatch the network monitoring data type with the description.ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseMatch the Windows host log to the messages contained in it. (Not all options are used.)IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich method is used by some malware to transfer files from infected hosts to a threat actor host?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseAfter a security monitoring tool identifies a malware attachment entering the network, what is the benefit of performing a retrospective analysis?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich protocol is exploited by cybercriminals who create malicious iFrames?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhat is the purpose of Tor?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich type of attack is carried out by threat actors against a network to determine which IP addresses, protocols, and ports are allowed by ACLs?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, Network DefenseWhich two technologies are primarily used on peer-to-peer networks? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, Network Defense