IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network Support and SecurityEmployees in an organization report that they cannot access the customer database on the main server. Further investigation reveals that the database file is now encrypted. Shortly afterward, the organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cybersecurity Essentials, Endpoint Security, IT Essentials 8, Network Support and SecurityWhat do you call an impersonation attack that takes advantage of a trusted relationship between two systems?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, IT Essentials 8, Network Support and SecurityWhat does a rootkit modify?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, Network Support and SecurityA secretary receives a phone call from someone claiming that their manager is about to give an important presentation but the presentation files are corrupted. The caller sternly asks that the secretary email the presentation right away to a personal email address. The caller also states that the secretary is being held personally responsible for the success of this presentation. What type of social engineering tactic is the caller using?ITExamAnswers asked 11 months ago • Endpoint Security, IT Essentials 8, Network Support and SecurityWhat is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, Network Support and SecurityWhat is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Cybersecurity Essentials, Endpoint Security, Network Support and Security, Networking EssentialsA cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server to crash. What is the type of attack the cyber criminal launches?ITExamAnswers asked 2 years ago • Endpoint Security, Network Support and SecurityWhat type of attack targets an SQL database using the input field of a user?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cybersecurity Essentials, DevNet, Endpoint Security, Network Support and SecurityEmployees in an organization report that the network access is slow. Further investigation reveals that one employee downloaded a third-party scanning program for the printer. What type of malware may have been introduced?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, Network Support and SecurityWhat is one of the safeguards according to the third dimension of the cybersecurity cube?ITExamAnswers asked 11 months ago • Network Support and SecurityA technician receives a trouble ticket from a user reporting that a website is no longer accessible. What two questions would the technician ask to narrow down the potential problem? (Choose two.)IT Administrator asked 12 months ago • IT Essentials 8, Network Support and SecurityWhich three security services are part of the concept of administrative access controls?ITExamAnswers asked 11 months ago • Network Support and SecurityThe employees in a company receive an email stating that the account password will expire immediately and requires a password reset within 5 minutes. Which statement would classify this email?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, Network Support and SecurityWhat is the purpose of using the Windows BitLocker To Go tool?ITExamAnswers asked 11 months ago • Network Support and SecurityWhich type of firewalls will inspect and filter network traffic based on OSI model Layer 3 and 4 information?ITExamAnswers asked 11 months ago • Network Support and Security