IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich definition of an antivirus program is true?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhile viewing packet capture data, you notice that one IP is sending and receiving traffic for multiple devices by modifying the IP header, Which option is making this behavior possible?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich two options are recognized forms of phishing? (Choose two )ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich two protocols are used for email (Choose two )ITExamAnswers asked 4 years ago • CCNA CyberOpsA firewall requires deep packet inspection to evaluate which layer?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich protocol is primarily supported by the third layer of the Open Systems Interconnection reference model?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich concern is important when monitoring NTP servers for abnormal levels of traffic?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich identifier is used to describe the application or process that submitted a log message?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich type of exploit normally requires the culprit to have prior access to the target system?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich security monitoring data type requires the most storage space?ITExamAnswers asked 4 years ago • CCNA CyberOpsIn computer security, which information is the term PHI used to describe?ITExamAnswers asked 4 years ago • CCNA CyberOpsYou must create a vulnerability management framework. Which main purpose of this framework is true?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich security principle states that more than one person is required to perform a critical task?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich term represents a potential danger that could take advantage of a weakness in a system?ITExamAnswers asked 4 years ago • CCNA CyberOpsRefer to the exhibit. A TFTP server has recently been installed in the Atlanta office. The network administrator is located in the NY office and has attempted to make a connection to the TFTP server. They are unable to backup the configuration file and Cisco IOS of the NY router to the TFTP server Which cause of this problem is true?ITExamAnswers asked 4 years ago • CCNA CyberOps