IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityA web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Introduction to CybersecurityWhat occurs after RSA keys are generated on a Cisco router to prepare for secure device management?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Endpoint SecurityWhich two options can limit the information discovered from port scanning? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhat is the result of a DHCP starvation attack?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhich security technology is commonly used by a teleworker when accessing resources on the main corporate office network?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhich statement describes a VPN?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Endpoint SecurityWhat is the motivation of a white hat attacker?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint Security, Introduction to CybersecurityWhich statement describes the term attack surface?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhich technology is used to secure, monitor, and manage mobile devices?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhich protocol provides authentication, integrity, and confidentiality services and is a type of VPN?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityMatch the type of cyberattackers to the description. (Not all options are used.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhat is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Cybersecurity Essentials, Endpoint Security, Network Support and Security, Networking EssentialsWhy would a rootkit be used by a hacker?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint Security, Operating Systems BasicsWhat is an IPS signature?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint Security