IT Questions Bank Match each term with its packet-switched technology definition:ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANMatch each term with its definition:ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANWhich layer of the hierarchical network design model is often called the backbone?ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANWhich of the following items are considered WAN devices? (Choose three.)ITExamAnswers asked 9 months ago • CCNA 4 v4.0 EWANMatch the commonly used ports on a Linux server with the corresponding service. (Not all options are used.)IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich statement describes the anomaly-based intrusion detection approach?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityMatch the security service with the description.ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat is an example of a local exploit?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityMatch the tabs of the Windows 10 Task Manager to their functions. (Not all options are used.)IT Administrator asked 4 years ago • IT Essentials, CCNA CyberOps, Endpoint Security, Operating Systems BasicsIn an attempt to prevent network attacks, cyber analysts share unique identifiable attributes of known attacks with colleagues. What three types of attributes or indicators of compromise are helpful to share? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhich data state is maintained in NAS and SAN services?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhat is the result of a passive ARP poisoning attack?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityThe entrepreneur is concerned about company employees having uninterrupted access to important resources and data. Which of the CIA triad components would address the concern?ITExamAnswers asked 10 months ago • Endpoint SecurityMatch the Windows command to the description.IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat is the function of the kernel of an operating system?ITExamAnswers asked 4 years ago • Endpoint Security, Operating Systems Basics