IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich SIEM function is associated with speeding up detection of security threats by examining logs and events from different systems?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhat are two methods used by cybercriminals to mask DNS attacks? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOpsRefer to the exhibit. What protocol would be used by the syslog server service to create this type of output for security purposes? NTP AAA ICMP SNMPITExamAnswers asked 4 years ago • CCNA CyberOpsRefer to the exhibit. What protocol would be used by the syslog server service to create this type of output for security purposes?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich network monitoring technology collects IP operational data on packets flowing through Cisco routers and multilayer switches?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich term is used to describe legitimate traffic that is mistaken for unauthorized traffic by firewalls and IPSs?ITExamAnswers asked 4 years ago • CCNA CyberOpsWhich technology is a proprietary SIEM system?IT Administrator asked 4 years ago • CCNA CyberOpsWhich security threat installs on a computer without the knowledge of the user and then monitors computer activity?ITExamAnswers asked 4 years ago • CCNA CyberOpsA senior citizen receives a warning on the computer that states that the operating system registry is corrupt and to click a particular link to repair it. Which type of malware is being used to try to create the perception of a computer threat to the user?ITExamAnswers asked 4 years ago • CCNA CyberOpsIn which phase of the NIST incident response life cycle is evidence gathered that can assist subsequent investigations by authorities?IT Administrator asked 4 years ago • CCNA CyberOpsWhat two shared sources of information are included within the MITRE ATT&CK framework? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOpsWhich tool included in the Security Onion includes the capability of designing custom dashboards?IT Administrator asked 4 years ago • CCNA CyberOpsWhich tool included in the Security Onion provides a visual interface to NSM data?IT Administrator asked 4 years ago • CCNA CyberOpsWhich HIDS is integrated into the Security Onion and uses rules to detect changes in host-based operating parameters caused by malware through system calls?IT Administrator asked 4 years ago • CCNA CyberOpsWhat is the purpose for data reduction as it relates to NSM?IT Administrator asked 4 years ago • CCNA CyberOps