IT Questions Bank Mar 16, 2020 Last Updated: Apr 13, 2022 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Endpoint SecurityA technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IT Essentials, IT Essentials 8What are two advantages of the NTFS file system compared with FAT32? (Choose two.)ITExamAnswers asked 3 years ago • IT Essentials, CCNA CyberOps, Endpoint Security, IT Essentials 8How do cybercriminals make use of a malicious iFrame?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, Network DefenseWhich statement describes one of the rules that govern interface behavior in the context of implementing a zone-based policy firewall configuration?IT Administrator asked 2 years ago • CCNA CyberOps, CCNA Security, Endpoint Security, Network DefenseWhat is the motivation of a white hat attacker?ITExamAnswers asked 2 years ago • CCNA CyberOps, CCNA Security, Endpoint Security, Introduction to CybersecurityA client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, Networking Basics, Networking EssentialsA PC user issues the netstat command without any options. What is displayed as the result of this command?IT Administrator asked 2 years ago • CCNA CyberOps, Endpoint Security, Networking BasicsWhich three IPv4 header fields have no equivalent in an IPv6 header? (Choose three.)ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, Networking Devices and Initial ConfigurationWhich two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)IT Administrator asked 2 years ago • CCNA CyberOps, Endpoint Security, Networking Devices and Initial ConfigurationWhich field in the IPv6 header points to optional network layer information that is carried in the IPv6 packet?IT Administrator asked 2 years ago • CCNA CyberOps, Endpoint Security, Networking Devices and Initial ConfigurationWhat is an attack vector as it relates to network security?ITExamAnswers asked 8 months ago • Endpoint SecurityWhat does the telemetry function provide in host-based security software?IT Administrator asked 2 years ago • CCNA CyberOps, Endpoint SecurityWhat is a feature of distributed firewalls?IT Administrator asked 2 years ago • CCNA CyberOps, Endpoint SecurityMatch the correct sequence of steps typically taken by a threat actor carrying out a domain shadowing attack.IT Administrator asked 2 years ago • CCNA CyberOps, Endpoint SecurityWhich Windows tool can be used by a cybersecurity administrator to secure stand-alone computers that are not part of an active directory domain?IT Administrator asked 2 years ago • CCNA CyberOps, Endpoint Security