IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhat is a host-based intrusion detection system (HIDS)?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhat are two drawbacks to using HIPS? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityA disgruntled employee is using Wireshark to discover administrative Telnet usernames and passwords. What type of network attack does this describe?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Endpoint SecurityWhich statement describes the Cisco Cloud Web Security?ITExamAnswers asked 3 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityRefer to the exhibit. The network “A” contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as “A”?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhat is a feature of the TACACS+ protocol?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Endpoint SecurityWhat is the main difference between the implementation of IDS and IPS devices?IT Administrator asked 3 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Endpoint SecurityWhat worm mitigation phase involves actively disinfecting infected systems?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhat method can be used to mitigate ping sweeps?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhat is involved in an IP address spoofing attack?IT Administrator asked 3 years ago • CCNA, CCNA CyberOps, CCNA Security, Endpoint SecurityWhat are two security features commonly found in a WAN design? (Choose two.)IT Administrator asked 3 years ago • CCNA Security, Endpoint Security, Network Security 1.0In the video that describes the anatomy of an attack, a threat actor was able to gain access through a network device, download data, and destroy it. Which flaw allowed the threat actor to do this?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhich resource is affected due to weak security settings for a device owned by the company, but housed in another location?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhich statement accurately characterizes the evolution of threats to network security?ITExamAnswers asked 4 years ago • CCNA Security, Endpoint Security, Networking EssentialsWhat is hyperjacking?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint Security, IoT Big Data & Analytics