IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Introduction to CybersecurityThe IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?ITExamAnswers asked 4 years ago • IT Essentials, CCNA, CCNA CyberOps, Introduction to Cybersecurity, IT Essentials 8How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?ITExamAnswers asked 4 years ago • IT Essentials, Introduction to Cybersecurity, IT Essentials 8What is the purpose of a backdoor?IT Administrator asked 2 years ago • Introduction to CybersecurityWhat type of attack uses zombies?ITExamAnswers asked 4 years ago • CCNA CyberOps, Introduction to CybersecurityFor what purpose would a network administrator use the Nmap tool?IT Administrator asked 2 years ago • Introduction to Cybersecurity‘A botnet can have tens of thousands of bots, or even hundreds of thousands.’ Is this statement true or false?IT Administrator asked 2 years ago • Introduction to CybersecurityWhich of the following are categories of security measures or controls? (Choose three correct answers)IT Administrator asked 2 years ago • Introduction to CybersecurityWhich of the following firewalls filters traffic based on source and destination data ports and filtering based on connection states?IT Administrator asked 2 years ago • Introduction to Cybersecurity‘An advanced persistent threat (APT) is usually well funded.’ Is this statement true or false?IT Administrator asked 2 years ago • Introduction to CybersecurityAn employee is at a restaurant with friends and tells them about an exciting new video game that is under development at the organization they work for. Is this employee’s behavior ethical or unethical?IT Administrator asked 2 years ago • Introduction to CybersecurityA port scan returns an ‘open’ response. What does this mean?IT Administrator asked 2 years ago • Introduction to CybersecurityWhat name is given to the emerging threat that hides on a computer or mobile device and uses that machine’s resources to mine cryptocurrencies?IT Administrator asked 2 years ago • Introduction to CybersecurityWhat name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group?IT Administrator asked 2 years ago • Introduction to CybersecurityWhich of the following tools used for incident detection can be used to detect anomalous behavior, command and control traffic, and detect infected hosts? (Choose two correct answers)IT Administrator asked 2 years ago • Introduction to CybersecurityWhat do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?IT Administrator asked 2 years ago • Introduction to Cybersecurity