IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA Discovery v4Refer to the graphic. What is the purpose of the Internet Filter option of Filter IDENT (Port 113. on the Linksys integrated router?ITExamAnswers asked 7 months ago • CCNA Discovery v4To which part of the network does the wireless access point part of a Linksys integrated router connect?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which statement is true about port forwarding within a Linksys integrated router?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which acronym refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?ITExamAnswers asked 7 months ago • CCNA Discovery v4What term is used to describe a dedicated hardware device that provides firewall services?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which two statements are true concerning anti-spam software? (Choose two.)ITExamAnswers asked 7 months ago • CCNA Discovery v4Which statement is true regarding anti-virus software?ITExamAnswers asked 7 months ago • CCNA Discovery v4What part of the security policy states what applications and usages are permitted or denied?ITExamAnswers asked 7 months ago • CCNA Discovery v4What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail?ITExamAnswers asked 7 months ago • CCNA Discovery v4What type of advertising is typically annoying and associated with a specific website that is being visited?ITExamAnswers asked 7 months ago • CCNA Discovery v4A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?ITExamAnswers asked 7 months ago • CCNA Discovery v4What is a major characteristic of a Worm?ITExamAnswers asked 7 months ago • CCNA Discovery v4While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?ITExamAnswers asked 7 months ago • CCNA Discovery v4During a pretexting event, how is a target typically contacted?ITExamAnswers asked 7 months ago • CCNA Discovery v4What are three techniques used in social engineering attacks? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Discovery v4