IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich two services are provided by security operations centers? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOpsAfter a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the incident and form an effective mitigation procedure. To whom should the incident ticket be escalated?ITExamAnswers asked 2 years ago • CCNA CyberOpsWhich personnel in a SOC is assigned the task of verifying whether an alert triggered by monitoring software represents a true security incident?IT Administrator asked 4 years ago • CCNA CyberOpsA company pays a significant sum of money to hackers in order to regain control of an email and data server. Which type of security attack was used by the hackers?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat was used as a cyberwarfare weapon to attack a uranium enrichment facility in Iran?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is the best definition of personally identifiable information (PII)?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is a rogue wireless hotspot?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is a botnet?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat commonly motivates cybercriminals to attack networks as compared to hacktivists or state-sponsored hackers?IT Administrator asked 4 years ago • CCNA, CCNA CyberOpsWhat name is given to an amateur hacker?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityAt the request of investors, a company is proceeding with cyber attribution with a particular attack that was conducted from an external source. Which security term is used to describe the person or device responsible for the attack?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is a potential risk when using a free and open wireless hotspot in a public location?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat type of malware has the primary objective of spreading across the network?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOpsWhat is cyberwarfare?ITExamAnswers asked 4 years ago • CCNA CyberOpsAn attacker sends a piece of malware as an email attachment to employees in a company. What is one probable purpose of the attack?ITExamAnswers asked 2 years ago • CCNA CyberOps