IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich file system is the primary file system used by Apple in current Macintosh computers?ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, Endpoint Security, IT Essentials 8, Operating Systems BasicsWhich Windows tool can be used by a cybersecurity administrator to secure stand-alone computers that are not part of an active directory domain?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhy would a rootkit be used by a hacker?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint Security, Operating Systems BasicsWhich language is used to query a relational database?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich network service allows administrators to monitor and manage network devices?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNP, Endpoint SecurityWhich field in the IPv4 header is used to prevent a packet from traversing a network endlessly?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Endpoint SecurityWhat are three benefits of using symbolic links over hard links in Linux? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Networking Devices and Initial Configuration, Operating Systems BasicsWhat type of attack targets an SQL database using the input field of a user?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cybersecurity Essentials, DevNet, Endpoint Security, Network Support and SecurityWhy is Kali Linux a popular choice in testing the network security of an organization?IT Administrator asked 4 years ago • CCNA CyberOps, Cybersecurity Essentials, Endpoint Security, Operating Systems BasicsWhat would be the target of an SQL injection attack?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Endpoint SecurityUsers in a company have complained about network performance. After investigation, the IT staff has determined that an attacker has used a specific technique that affects the TCP three-way handshake. What is the name of this type of network attack?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint SecurityOn a Windows host, which tool can be used to create and maintain blacklists and whitelists?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich two options are window managers for Linux? (Choose two.)IT Administrator asked 2 years ago • CCNA CyberOps, Endpoint Security, Operating Systems Basics