IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CyberOps AssociateA threat actor constructs IP packets that appear to come from a valid source within the corporate network. What type of attack is this?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0In what type of attack does a threat attacker attach to the network and read communications from network users?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0A threat actor has gained access to encryption keys that will permit them to read confidential information. What type of attack is this?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0Threat actors have positioned themselves between a source and destination to monitor, capture, and control communications without the knowledge of network users. What type of attack is this?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0In what type of attack can threat actors change the data in packets without the knowledge of the sender or receiver?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0Hackers have gained access to account information and can now login into a system with the same rights as authorized users. What type of attack is this?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What authenticates users to allow access to specific network resources and records what the user does while connected to the resource?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich option allows administrators to monitor and manage network devices?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat gathers a variety of statistics for devices that are configured to send and log status messages?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat sets the date and time on network devices?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat is a private network that is created over a public network?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat provides statistics on packet flows passing through a networking device?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat is a series of commands that control whether a device forwards or drops packets based on information found in the packet header?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat allows a switch to make duplicate copies of traffic passing through it, and then send it out a port with a network monitor attached?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich type of firewall filters IP traffic between a pair of bridged interfaces?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0