IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich source provides reports of vulnerabilities in software and hardware to a Security Operations Center?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich of the following is the team that handles the investigation, resolution, and disclosure of security vulnerabilities in vendor products and services?ITExamAnswers asked 4 years ago • CCNA CyberOpsYou see 100 HTTP GET and POST requests for various pages on one of your web servers. The user agent in the requests contain php code that, if executed, creates and writes to a new php file on the webserver. Which category does this event fall under as defined in the Diamond Model of Intrusion?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich of the following are the three metrics, or scores, of the CVSS?ITExamAnswers asked 4 years ago • CCNA CyberOpsEmployee are allowed to access internal websites. Employee access an internal website but IDS report as a malicious behaviorITExamAnswers asked 4 years ago • CCNA CyberOpsWhich CVSSv3 metric value increases when attacks consume network bandwidth, processor cycles, or disk space?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich CVSSv3 metric captures the level of access that is required for a successful attack?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich type of analysis assigns values to scenarios to see what the outcome might be in each scenario?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich two HTTP header fields relate to intrusion analysis? (Choose two).ITExamAnswers asked 4 years ago • CCNA CyberOpsRefer to the exhibit. Which packet contains a file that is extractable within Wireshark?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is the correct about listening port?ITExamAnswers asked 4 years ago • CCNA CyberOpsRefer to the exhibit. Which application protocol is in this PCAP file?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich of the following is one of the main goals of data normalization?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich of the following is not a metadata feature of the Diamond Model?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is the process of remediation the system from attack so that responsible threat actor can be revealed?ITExamAnswers asked 4 years ago • CCNA CyberOps