IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich core open source component of the Elastic-stack is responsible for accepting the data in its native format and making elements of the data consistent across all sources?ITExamAnswers asked 4 years ago • CCNA CyberOpsMatch the security management function with the description.IT Administrator asked 3 years ago • CCNA CyberOpsMatch the description to the Linux term. (Not all options are used.)IT Administrator asked 4 years ago • CCNA CyberOpsWhich information security component is compromised in a DDoS attack?IT Administrator asked 3 years ago • CCNA CyberOpsMatch the IPS alarm with the description.ITExamAnswers asked 4 years ago • CCNA CyberOpsMatch the attack vector with the description.ITExamAnswers asked 4 years ago • CCNA CyberOpsA user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2 . What does this code represent?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOpsMatch each statement about FTP communications to the connection it describes. (Not all options are used.)IT Administrator asked 3 years ago • CCNA CyberOpsWhat is the role of an IPS?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA SecurityWhich cyber attack involves a coordinated attack from a botnet of zombie computers?IT Administrator asked 4 years ago • CCNA CyberOps, CCNAWhat specialized network device is responsible for enforcing access control policies between networks?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat best describes the security threat of spoofing?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich two statements describe the use of asymmetric algorithms? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich two types of attacks are examples of reconnaissance attacks? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat are two characteristics of Ethernet MAC addresses? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps