IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: IT EssentialsUsers in a company have complained about network performance. After investigation, the IT staff has determined that the attacker was using a specific technique that affected the TCP three-way handshake. What is the type of network attack?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What is the purpose of Windows 10 ReadyBoost?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8What is the advantage of having a redundant power supply?ITExamAnswers asked 1 year ago • IT Essentials, IT Essentials 8A user cannot open several apps on a cell phone and takes the device into a repair shop. What is one possible cause for this situation?ITExamAnswers asked 4 years ago • IT Essentials, IT Essentials 8What would be a reason for a computer user to use the Task Manager Performance tab?ITExamAnswers asked 4 years ago • IT Essentials, Endpoint Security, Operating Systems BasicsWhich file system is the primary file system used by Apple in current Macintosh computers?ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, Endpoint Security, IT Essentials 8, Operating Systems BasicsWhat is required in order to connect a Wi-Fi enabled laptop to a WPA secured wireless network?IT Exam Answers asked 2 years ago • Endpoint Security, IT EssentialsA network administrator is setting up a web server for a small advertising office and is concerned with data availability. The administrator wishes to implement disk fault tolerance using the minimum number of disks required. Which RAID level should the administrator choose?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8, Network DefenseWhat are two physical security precautions that a business can take to protect its computers and systems? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, Network DefenseWhat Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?IT Administrator asked 4 years ago • IT Essentials, Cybersecurity Essentials, Network DefenseWhich two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, CCNA Discovery v4, IT Essentials 8Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, CCNA Discovery v4, IT Essentials 8A network client in a corporate environment reboots. Which type of server would most likely be used first?ITExamAnswers asked 4 years ago • IT Essentials, CCNA Discovery v4A network technician attempts to ping www.example.net from a customer computer, but the ping fails. Access to mapped network drives and a shared printer are working correctly. What are two potential causes for this problem? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, Networking BasicsWhat are two common media used in networks? (Choose two.)ITExamAnswers asked 3 years ago • IT Essentials, IT Essentials 8, Networking Basics, Networking Essentials