IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich netstat command show ports?ITExamAnswers asked 4 years ago • CCNA CyberOpsYou receive an alert for malicious code that exploits Internet Explorer and runs arbitrary code on the site visitor machine. The malicious code is on an external site that is being visited by hosts on your network. Which user agent in the HTTP headers in the requests from your internal hosts warrants further investigation?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is the definition of confidentiality according to CVSSv3 framework?ITExamAnswers asked 4 years ago • CCNA CyberOpsDuring which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich CVSSv3 Attack Vector metric value requires the attacker to physically touch or manipulate the vulnerable component?ITExamAnswers asked 4 years ago • CCNA CyberOpsA CMS plugin creates two files that are accessible from the Internet myplugin.html and exploitable.php. A newly discovered exploit takes advantage of an injection vulnerability in exploitable.php. To exploit the vulnerability, one must send an HTTP POST with specific variables to exploitable.php. You see traffic to your webserver that consists of only HTTP GET requests to myplugin.html. Which category best describes this activity?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich of the following can be identified by correlating DNS intelligence and other security events? (Choose two)ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat attribute belonging VERIS schema?ITExamAnswers asked 4 years ago • CCNA CyberOpsFiltering ports in Wireshark?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhen performing threat hunting against a DNS server, which traffic toward the affected domain is considered a starting point?ITExamAnswers asked 4 years ago • CCNA CyberOpsIn Microsoft Windows, as files are deleted the space they were allocated eventually is considered available for use by other files. This creates alternating used and unused areas of various sizes. What is this called?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is the difference between deterministic and probabilistic assessment method?ITExamAnswers asked 4 years ago • CCNA CyberOpsAccording to NIST what option is unnecessary for containment strategy?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich process is being utilized when IPS events are removed to improve data integrity?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat does the CSIRT incident response provider usually do?ITExamAnswers asked 4 years ago • CCNA CyberOps