IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Endpoint SecurityConsider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich statement describes a VPN?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Endpoint SecurityWhat is the reason for disabling SSID broadcasting and changing the default SSID on a wireless access point?IT Administrator asked 4 years ago • Endpoint SecurityWhat is the motivation of a white hat attacker?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint Security, Introduction to CybersecurityWhich wireless parameter refers to the frequency bands used to transmit data to a wireless access point?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich antimalware software approach can recognize various characteristics of known malware files to detect a threat?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityA threat actor uses a program to launch an attack by sending a flood of UDP packets to a server on the network. The program sweeps through all of the known ports trying to find closed ports. It causes the server to reply with an ICMP port unreachable message and is similar to a DoS attack. Which two programs could be used by the threat actor to launch the attack? (Choose two.)ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IoT SecurityHow much RAM is addressable by a 32-bit version of Windows?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityA secretary receives a phone call from someone claiming that their manager is about to give an important presentation but the presentation files are corrupted. The caller sternly asks that the secretary email the presentation right away to a personal email address. The caller also states that the secretary is being held personally responsible for the success of this presentation. What type of social engineering tactic is the caller using?ITExamAnswers asked 11 months ago • Endpoint Security, IT Essentials 8, Network Support and SecurityWhich statement describes the term attack surface?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhich wireless encryption method is the most secure?ITExamAnswers asked 4 years ago • CCNP, Endpoint SecurityWhich statement describes the term iptables?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityMatch typical Linux log files to the function.IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat kind of ICMP message can be used by threat actors to map an internal IP network?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint SecurityWhich technology is used to secure, monitor, and manage mobile devices?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint Security