IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: IoT SecurityA threat actor wants to interrupt a normal TCP communication between two hosts by sending a spoofed packet to both endpoints. Which TCP option bit would the threat actor set in the spoofed packet?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IoT SecurityA threat actor uses a program to launch an attack by sending a flood of UDP packets to a server on the network. The program sweeps through all of the known ports trying to find closed ports. It causes the server to reply with an ICMP port unreachable message and is similar to a DoS attack. Which two programs could be used by the threat actor to launch the attack? (Choose two.)ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IoT SecurityWhich parameter is used to identify applications when a user sends a service request to a remote server?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, IoT SecurityMatch the term to the description.IT Administrator asked 4 years ago • CCNA CyberOps, IoT Security, Network DefenseAfter host A receives a web page from server B, host A terminates the connection with server B. Match each option to its correct step in the normal termination proccess for a TCP connection.ITExamAnswers asked 2 years ago • Endpoint Security, IoT SecurityA threat actor has used malicious commands to trick the database into returning unauthorized records and other data. Which web front-end vulnerability is the threat actor exploiting?ITExamAnswers asked 2 years ago • DevNet, IoT SecurityMatch the question to one of the three contributors to the determination of risk when performing a risk assessment. (Not all options are used.)ITExamAnswers asked 2 years ago • IoT SecurityWhich type of access control model assigns security level labels to information and is typically used in military or mission critical applications?ITExamAnswers asked 2 years ago • IoT SecurityWhat are two attributes of IoT that make applying traditional security methods challenging? (Choose two.)ITExamAnswers asked 2 years ago • IoT SecurityA security researcher has completed a vulnerability assessment and has documented a list of vulnerabilities. When performing a risk assessment, what should these documented items be translated into?ITExamAnswers asked 2 years ago • IoT SecurityAn IoT device uses Busybox. What is the purpose of entering the busybox command in the command line?ITExamAnswers asked 2 years ago • IoT SecurityWhich technology type describes a refrigerator that has become part of a botnet that is attacking businesses?ITExamAnswers asked 3 years ago • IoT, IoT SecurityWhy are most IoT devices not directly connected to a Wi-Fi access point or router?ITExamAnswers asked 2 years ago • IoT SecurityWhy do some IoT devices rely on gateways for the internet connection?ITExamAnswers asked 2 years ago • IoT SecurityA threat actor has intercepted security keys that are used to establish communications. Which popular remote exploit was used by the threat actor?ITExamAnswers asked 2 years ago • IoT Security