IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsRefer to the exhibit. A cybersecurity analyst is viewing captured packets forwarded on switch S1. Which device is the source of the captured packet?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich network service is used by clients to resolve the IP address of a domain name?ITExamAnswers asked 4 years ago • CCNA CyberOpsA cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway?ITExamAnswers asked 4 years ago • CCNA CyberOpsRefer to the exhibit. A user reports that resources can no longer be reached on the local 192.168.1.0/24 network nor on the internet. A cybersecurity analyst investigates the issue by reviewing the routing table of the PC in question. What is the reason for the problem reported by the user?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich two protocols are associated with the transport layer? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOpsMatch the type of CSIRT with the description.ITExamAnswers asked 4 years ago • CCNA CyberOpsWhen dealing with security threats and using the Cyber Kill Chain model, which two approaches can an organization use to block a potential back door creation? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOpsRefer to the exhibit. A network security analyst is examining captured data using Wireshark. What is represented by the first three frames?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich type of events should be assigned to categories in Sguil?IT Administrator asked 4 years ago • CCNA CyberOpsWhich statement describes the state of the administrator and guest accounts after a user installs Windows desktop version to a new computer?IT Administrator asked 4 years ago • CCNA CyberOpsWhen a user visits an online store website that uses HTTPS, the user browser queries the CA for a CRL. What is the purpose of this query?ITExamAnswers asked 4 years ago • CCNA CyberOpsA law office uses a Linux host as the firewall device for the network. The IT administrator is configuring the firewall iptables to block pings from Internet devices to the Linux host. Which iptables chain should be modified to achieve the task?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich schema or model allows security professionals to enter data about a particular incident, such as victim demographics, incident description, discovery method and response, and impact assessment, and share that data with the security community anonymously?ITExamAnswers asked 4 years ago • CCNA CyberOpsIn threat intelligence communications, which sharing standard is a specification for an application layer protocol that allows communication of cyberthreat intelligence over HTTPS?ITExamAnswers asked 4 years ago • CCNA CyberOpsRefer to the exhibit. A network security specialist is issuing the tail command to monitor the Snort alert in real time. Which option should be used in the command line to watch the file for changes?ITExamAnswers asked 4 years ago • CCNA CyberOps