IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network DefenseWhat is a feature of the tcpdump tool?ITExamAnswers asked 2 years ago • CCNA CyberOps, Network DefenseA company decides to purchase a device capable of managing load balancing so that traffic will be distributed between their servers. What could be a potential problem using the new device on the network?ITExamAnswers asked 2 years ago • CCNA CyberOps, Network DefenseA cyberanalyst is reviewing an entry-point ACL. What three types of ICMP traffic should be allowed to access an internal network from the internet? (Choose three.)ITExamAnswers asked 2 years ago • CCNA CyberOps, Network DefenseHow can NAT/PAT complicate network security monitoring if NetFlow is being used?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich statement describes the function provided by the Tor network?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhat method allows VPN traffic to remain confidential?ITExamAnswers asked 2 years ago • CCNA CyberOps, Network DefenseWhat type of server can threat actors use DNS to communicate with?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich protocol is used to send e-mail messages between two servers that are in different e-mail domains?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhat port number would be used if a threat actor was using NTP to direct DDoS attacks?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhat is a strength of using a hashing function?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhat term is used to describe concealing data in another file such as a graphic, audio, or other text file?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhat term is used to describe the technology that replaces sensitive information with a nonsensitive version?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhat two assurances does digital signing provide about code that is downloaded from the Internet? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat technology allows users to verify the identity of a website and to trust code that is downloaded from the Internet?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich statement describes the use of certificate classes in the PKI?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network Defense