IT Questions Bank Mar 16, 2020 Last Updated: Apr 13, 2022 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network Security 1.0Which two protocols generate connection information within a state table and are supported for stateful filtering? (Choose two.)IT Administrator asked 2 years ago • CCNA Security, Network Security 1.0Which network type consists of a number of LANs that are connected together across a limited geographic area?ITExamAnswers asked 2 months ago • Network Security 1.0Which hash function is the most secure?ITExamAnswers asked 2 months ago • CyberOps Associate, Network Security 1.0Which algorithm provides asymmetric encryption?ITExamAnswers asked 2 months ago • CyberOps Associate, Network Security 1.0What is an example of a symmetric encryption algorithm?ITExamAnswers asked 2 months ago • CyberOps Associate, Network Security 1.0True or False? In asymmetric encryption, encryption and decryption use the same key.ITExamAnswers asked 2 months ago • CyberOps Associate, Network Security 1.0What is the weakest link in network security?ITExamAnswers asked 2 months ago • CyberOps Associate, Network Security 1.0What type of attack is port scanning?ITExamAnswers asked 2 months ago • CCNA 3 v7, CyberOps Associate, Network Security 1.0What type of attack is tailgating?ITExamAnswers asked 2 months ago • CCNA 3 v7, CyberOps Associate, Network Security 1.0What is the weakest link in network security?ITExamAnswers asked 2 months ago • CyberOps Associate, Network Security 1.0What type of malware attempts to convince people to divulge their personally identifable information (PII)?ITExamAnswers asked 2 months ago • CyberOps Associate, Network Security 1.0What type of malware encrypts all data on a drive and demands payment in Bitcoin cryptocurrence to unencrypt the files?ITExamAnswers asked 2 months ago • CyberOps Associate, Network Security 1.0What type of malware typically displays annoying pop-ups to generate revenue for its author?ITExamAnswers asked 2 months ago • CyberOps Associate, Network Security 1.0What type of malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network.ITExamAnswers asked 2 months ago • CyberOps Associate, Network Security 1.0What type of attack prevents the normal use of a computer or network by valid users?ITExamAnswers asked 2 months ago • CyberOps Associate, Network Security 1.0