IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CyberOps AssociateWhich of the following uses a profile-based approach to configuring firewall functionality?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat allows Linux system administrators to configure network access rules that are part of the Linux kernel Netfilter modules?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich type of endpoint protection permits only authorized and compliant devices to connect to the network?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat provides filtering of websites and block listing to prevent endpoints from accessing malicious web pages?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich type of endpoint protection includes iptables and TCP Wrapper?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich type of antimalware software recognizes various characteristics of known malware files?ITExamAnswers asked 2 years ago • CyberOps AssociateTrue or False? Endpoints are hosts on the network that can access or be accessed by other hosts on the network.ITExamAnswers asked 2 years ago • CyberOps AssociateWhich hash function is the most secure?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0Which algorithm provides asymmetric encryption?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What is an example of a symmetric encryption algorithm?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0True or False? In asymmetric encryption, encryption and decryption use the same key.ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What are three threat intelligence information sharing specifications?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich security operations platform integrates and enhances a range of security tools and threat intelligence?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat is a world leading threat intelligence team with a goal to help protect enterprise users, data, and infrastructure from active adversaries?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat is the free service that is offered by the U.S. Department of Homeland Security?ITExamAnswers asked 2 years ago • CyberOps Associate