IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsIn the NIST incident response process life cycle, which type of attack vector involves the use of brute force against devices, networks, or services?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich two types of unreadable network traffic could be eliminated from data collected by NSM? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat characterizes a threat actor?ITExamAnswers asked 4 years ago • CCNA CyberOpsIn a Linux operating system, which component interprets user commands and attempts to execute them?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich two network protocols can be used by a threat actor to exfiltrate data in traffic that is disguised as normal network traffic? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat are two features of ARP? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOpsMatch the attack tools with the description. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat debugging security tool can be used by black hats to reverse engineer binary files when writing exploits?ITExamAnswers asked 4 years ago • CCNA CyberOpsThe HTTP server has responded to a client request with a 200 status code. What does this status code indicate?ITExamAnswers asked 4 years ago • CCNA CyberOpsIf a SOC has a goal of 99.999% uptime, how many minutes of downtime a year would be considered within its goal?ITExamAnswers asked 4 years ago • CCNA CyberOpsMatch the monitoring tool to the definition.ITExamAnswers asked 4 years ago • CCNA CyberOpsMatch the server profile element to the description. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNA CyberOpsRefer to the exhibit. A cybersecurity analyst is viewing packets forwarded by switch S2. What addresses will identify frames containing data sent from PCA to PCB?ITExamAnswers asked 4 years ago • CCNA CyberOpsMatch the alert classification with the description.ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich Linux command could be used to discover the process ID (PID) for a specific process before using the kill command?ITExamAnswers asked 4 years ago • CCNA CyberOps