IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CyberOps AssociateWhich access control model applies the strictest access control and is typically used in military or mission critical applications?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich access control model is based on an individual’s roles and responsibilities within the organization?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich access control model is based on attributes of the object (resource) to be accessed, the subject (user) accessing the resource, and environmental factors regarding how the object is to be accessed, such as time of day?ITExamAnswers asked 2 years ago • CyberOps AssociateIn what type of attack are HTTP redirect messages used to send users to malicious websites?ITExamAnswers asked 2 years ago • CyberOps AssociateA threat actor accesses a list of user email addresses by sending database commands through an insecure login page. What type of attack is this?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat should a cybersecurity analyst look for to detect DNS tunneling?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat enables a threat actor to impersonate the default gateway and receive all traffic that is sent to hosts that are not on the local LAN segment?ITExamAnswers asked 2 years ago • CyberOps AssociateA program sends a flood of UDP packets from a spoofed host to a server on the subnet sweeping through all the known UDP ports looking for closed ports. This will cause the server to reply with an ICMP port unreachable message. Which attack is this?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack is being used when the threat actor spoofs the IP address of one host, predicts the next sequence number, and sends an ACK to the other host?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateTwo hosts have established a TCP connection and are exchanging data. A threat actor sends a TCP segment with the RST bit set to both hosts informing them to immediately stop using the TCP connection. Which attack is this?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack exploits the three-way handshake?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack being used is when a threat actor creates packets with false source IP address information to either hide the identity of the sender, or to pose as another legitimate user?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack is being used when threat actors use pings to discover subnets and hosts on a protected network, to generate flood attacks, and to alter host routing tables?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack is being used when threat actors initiate a simultaneous, coordinated attack from multiple source machines?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack is being used when threat actors gain access to the physical network, and then use an MiTM attack to capture and manipulate a legitimate user’s traffic?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps Associate