IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsA user is curious about how someone might know a computer has been infected with malware. What are two common malware behaviors? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat are two evasion methods used by hackers? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityA user successfully logs in to a corporate network via a VPN connection. Which part of the AAA process records that a certain user performed a specific operation at a particular date and time?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich two characteristics describe a virus? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhy is Diffie-Hellman algorithm typically avoided for encrypting data?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is the significant characteristic of worm malware?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, CCNA SecurityWhat commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich component in Linux is responsible for interacting directly with the device hardware?ITExamAnswers asked 4 years ago • CCNA CyberOps, IoTWhich term is used to describe the process of identifying the NSM-related data to be gathered?IT Administrator asked 3 years ago • CCNA CyberOpsWhich top-level element of the VERIS schema would allow a company to log who the actors were, what actions affected the asset, which assets were affected, and how the asset was affected?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich top-level element of the VERIS schema would allow a company to document the incident timeline?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is a property of the ARP table on a device?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich term describes evidence that is in its original state?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is the goal of an attack in the installation phase of the Cyber Kill Chain?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich technology is a major standard consisting of a pattern of symbols that describe data to be matched in a query?IT Administrator asked 4 years ago • CCNA CyberOps