IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network Support and SecurityWhat is the limitation of using a stateful firewall in a network?ITExamAnswers asked 11 months ago • Network Support and SecurityBy having narrow viewing angles, an ATM mitigates what kind of attacks?ITExamAnswers asked 11 months ago • Network Support and SecurityWhich cybersecurity solution should an organization implement to support employees who travel and use public Wi-Fi networks to access corporate information?ITExamAnswers asked 11 months ago • Network Support and SecurityA network technician troubleshoots a user’s PC problem and launches the Task Manager to gather more information. What information can the technician gather from the Task Manager output?ITExamAnswers asked 11 months ago • Network Support and SecurityWhat information can a technician obtain by running the tracert command on a Windows PC?ITExamAnswers asked 11 months ago • Network Support and SecurityA user reports that the computer occasionally loses connectivity to the wireless network. The technician checks the configuration on the user’s computer and then replaces the wireless access point with a known good one. What structured troubleshooting method is the technician using to solve the problem?ITExamAnswers asked 11 months ago • Network Support and SecurityAll employees in an organization receive an email stating that their account password will expire immediately and that they should reset their password within five minutes. Which of the following statements best describes this email?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, Network Support and SecurityRefer to the exhibit. The image shows a firewall filtering network traffic based on information at highlighted OSI model Layers. Which type of firewall is represented?ITExamAnswers asked 11 months ago • Network Support and SecurityNetbus belongs to which malware type?IT Administrator asked 12 months ago • Cybersecurity Essentials, Network Support and SecurityAn administrator wishes to create a security policy document for end-users to protect against known unsafe websites and to warn the user about the dangers and handling of suspicious emails. What type of malware attack is being prevented?ITExamAnswers asked 1 year ago • Cybersecurity Essentials, Network Support and SecurityWhich authentication method uses AES for encryption?ITExamAnswers asked 11 months ago • Network Support and SecurityWhat is the main reason to establish an initial network performance baseline?ITExamAnswers asked 11 months ago • Network Support and Securityhich statement describes the principle of availability in the CIA information security triad?ITExamAnswers asked 11 months ago • Network Support and SecurityAfter a problem is defined, what is the next step in the seven-step troubleshooting process?ITExamAnswers asked 11 months ago • Network Support and SecurityA penetration test carried out by an organization identified a backdoor on the network. What action should the organization take to find out if their systems have been compromised?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, Network Support and Security