IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network Security 1.0What are two security features commonly found in a WAN design? (Choose two.)IT Administrator asked 3 years ago • CCNA Security, Endpoint Security, Network Security 1.0Which two protocols generate connection information within a state table and are supported for stateful filtering? (Choose two.)IT Administrator asked 3 years ago • CCNA Security, Network Security 1.0Which network type consists of a number of LANs that are connected together across a limited geographic area?ITExamAnswers asked 2 years ago • Network Security 1.0Which hash function is the most secure?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0Which algorithm provides asymmetric encryption?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What is an example of a symmetric encryption algorithm?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0True or False? In asymmetric encryption, encryption and decryption use the same key.ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What is the weakest link in network security?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What type of attack is port scanning?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps Associate, Network Security 1.0What type of attack is tailgating?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps Associate, Network Security 1.0What is the weakest link in network security?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What type of malware attempts to convince people to divulge their personally identifable information (PII)?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What type of malware encrypts all data on a drive and demands payment in Bitcoin cryptocurrence to unencrypt the files?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What type of malware typically displays annoying pop-ups to generate revenue for its author?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What type of malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network.ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0