IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhat is the difference between an HIDS and a firewall?IT Administrator asked 4 years ago • CCNA CyberOps, Cybersecurity Essentials, Endpoint SecurityWhat are three access control security services? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Cybersecurity Essentials, Endpoint SecurityWhat is a function of SNMP?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityA user calls the help desk complaining that the password to access the wireless network has changed without warning. The user is allowed to change the password, but an hour later, the same thing occurs. What might be happening in this situation?IT Administrator asked 4 years ago • CCNA CyberOps, Cybersecurity Essentials, Endpoint SecurityWhich risk management plan involves discontinuing an activity that creates a risk?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityMatch the attack to the definition. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat kind of ICMP message can be used by threat actors to create a man-in-the-middle attack?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityMatch the network-based antimalware solution to the function. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNA CyberOpsData is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, DevNetWhich statement best describes a motivation of hacktivists?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cybersecurity EssentialsA computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cybersecurity EssentialsWhat is the term used to describe an email that is targeting a specific person employed at a financial institution?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cybersecurity EssentialsWhat service determines which resources a user can access along with the operations that a user can perform?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cybersecurity EssentialsWhich two techniques are used in a smurf attack? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, IoT SecurityWhich attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, IoT Security