IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhat is a characteristic of a Trojan horse as it relates to network security?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2Which two statements characterize DoS attacks? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Which two statements describe access attacks? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2Which two network security solutions can be used to mitigate DoS attacks? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2How is a smurf attack conducted?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2What are the three major components of a worm attack? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2Which two statements are characteristics of a virus? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2When describing malware, what is a difference between a virus and a worm?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Introduction to CybersecurityWhat are two objectives of ensuring data integrity? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Introduction to CybersecurityWhich tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?IT Administrator asked 3 years ago • CCNA Security, Introduction to CybersecurityWhich type of attack allows an attacker to use a brute-force approach?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Introduction to CybersecurityIn what way are zombies used in security attacks?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Introduction to CybersecurityWhat is another name for confidentiality of information?IT Administrator asked 3 years ago • CCNA Security, Introduction to CybersecurityWhat three items are components of the CIA triad? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA, CCNA Security, Introduction to CybersecurityA network administrator is trying to download a valid file from an internal server. However, the process triggers an alert on a NMS tool. What condition describes this alert?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network Defense