IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsHow does AIS address a newly discovered threat?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat does the telemetry function provide in host-based security software?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat is a feature of distributed firewalls?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityMatch the correct sequence of steps typically taken by a threat actor carrying out a domain shadowing attack.IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich technique could be used by security personnel to analyze a suspicious file in a safe environment?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich wireless parameter is used by an access point to broadcast frames that include the SSID?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityMatch the network service with the description.ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat are two types of attacks used on DNS open resolvers? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat are two shared characteristics of the IDS and the IPS? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhich two types of hackers are typically classified as grey hat hackers? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, CCNA Security, Endpoint SecurityA network administrator is checking the system logs and notices unusual connectivity tests to multiple well-known ports on a server. What kind of potential network attack could this indicate?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat are three functions provided by the syslog service? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhy would an attacker want to spoof a MAC address?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityMatch the Windows system tool with the description. (Not all options are used.)IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich statement describes the Cisco Threat Grid Glovebox?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security