IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhat device is usually the first line of defense in a layered defense-in-depth approach?ITExamAnswers asked 4 years ago • CCNA CyberOpsIn threat intelligence communications, what set of specifications is for exchanging cyberthreat information between organizations?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich of the following offers a free service called Automated Indicator Sharing that enables the real-time exchange of cyberthreat indicators?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat is the TCP mechanism used in congestion avoidance?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOpsWhich network monitoring tool saves captured network frames in PCAP files?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhen a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOpsMatch the job titles to SOC personnel positions. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNA CyberOpsRefer to the exhibit. Which field in the Sguil application window indicates the priority of an event or set of correlated events?IT Administrator asked 4 years ago • CCNA CyberOpsHow does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats?IT Administrator asked 4 years ago • CCNA CyberOpsWhich statement describes the function of the Server Message Block (SMB) protocol?IT Administrator asked 4 years ago • CCNA CyberOpsWhich regulatory law regulates the identification, storage, and transmission of patient personal healthcare information?IT Administrator asked 4 years ago • CCNA CyberOpsMatch the SOC metric to the description. (Not all options are used.)IT Administrator asked 4 years ago • CCNA CyberOpsMatch the monitoring tool to the description.ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich network monitoring tool saves captured packets in a PCAP file?ITExamAnswers asked 4 years ago • CCNA CyberOpsRefer to the exhibit. A junior network administrator is inspecting the traffic flow of a particular server in order to make security recommendations to the departmental supervisor. Which recommendation should be made?ITExamAnswers asked 4 years ago • CCNA CyberOps