IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network DefenseWhy could network Syslog servers be a target for threat actors?ITExamAnswers asked 9 months ago • Network DefenseWhat are two benefits offered by a zone-based policy firewall on a Cisco router? (Choose two.)IT Administrator asked 3 years ago • CCNA Security, Network DefenseA SOHO office is using a public cloud provider to host their website. The IT technician is choosing an approach to protect transaction data between the website and visitors from the internet. Which type of encryption key management method should the technician choose?ITExamAnswers asked 9 months ago • Network DefenseWhat does it indicate if the timestamp in the HEADER section of a syslog message is preceded by a period or asterisk symbol?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseRefer to the exhibit. A security analyst is reviewing an alert message generated by Snort. What does the number 2100498 in the message indicate?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseAn investigator finds a USB drive at a crime scene and wants to present it as evidence in court. The investigator takes the USB drive and creates a forensic image of it and takes a hash of both the original USB device and the image that was created. What is the investigator attempting to prove about the USB drive when the evidence is submitted in court?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhich term describes the ability of a web server to keep a log of the users who access the server, as well as the length of time they use it?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseA cybersecurity analyst is going to verify security alerts using the Security Onion. Which tool should the analyst visit first?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich two statements describe the effects of the access control list wildcard mask 0.0.0.31? (Choose two.)ITExamAnswers asked 9 months ago • Network DefenseWhat is an example of transaction data recorded by a network security monitoring tool?ITExamAnswers asked 9 months ago • Network DefenseWhat is one of the first actions performed on Internet-connected smart devices before being put into service?ITExamAnswers asked 9 months ago • Network DefenseWhy must a network administrator consider more security features in addition to firewalls to achieve the best possible network security?ITExamAnswers asked 9 months ago • Network DefenseWhy can ACLs give a false sense of security if overly relied upon as a network security technology?ITExamAnswers asked 9 months ago • Network DefenseWhich network logs contain information that a security analyst can use to determine if packets received from the web are in response to legitimate requests or are part of an exploit?ITExamAnswers asked 9 months ago • Network DefenseWhat is the purpose of a digital certificate?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network Defense