IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Endpoint SecurityWhat is the purpose of the cd\ command?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsAs described by the SANS Institute, which attack surface includes the exploitation of vulnerabilities in wired and wireless protocols used by IoT devices?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat three tasks are accomplished by a comprehensive security policy? (Choose three.)ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity Essentials, Endpoint SecurityWhat would be displayed if the netstat -abno command was entered on a Windows PC?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat is the first line of defense to protect a device from improper access control?ITExamAnswers asked 2 years ago • Endpoint SecurityWhat occurs when a rogue access point is added to a WLAN?ITExamAnswers asked 2 years ago • CCNA 3 v4, Endpoint SecurityA client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, IT Essentials 8, Networking Basics, Networking Essentials, Operating Systems BasicsWhich two attacks target web servers through exploiting possible vulnerabilities of input functions used by an application? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, DevNet, Endpoint SecurityWhat is the result of a DHCP starvation attack?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityMatch the network-based anti-malware solution to the function. (Not all options are used.)ITExamAnswers asked 2 years ago • Endpoint SecurityWhich of the following statements describes a distributed denial of service (DDoS) attack?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhich security technology is commonly used by a teleworker when accessing resources on the main corporate office network?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhat does a rootkit modify?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, Network Support and SecurityWhat are three states of data during which data is vulnerable? (Choose three.)ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityIn Windows Firewall, when is the Domain profile applied?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security