IT Questions Bank Which statement describes agentless antivirus protection?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich technology might increase the security challenge to the implementation of IoT in an enterprise environment?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityIn most host-based security suites, which function provides robust logging of security-related events and sends logs to a central location?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich operating system source code can be downloaded and modified by any person or company?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint SecurityA technician has captured packets on a network that has been running slowly when accessing the internet. Which port number should the technician look for within the captured material to locate HTTP packets?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IT Essentials, IT Essentials 8, Operating Systems BasicsWhat is a benefit of Linux being an open source operating system?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsConsider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsA system administrator issues the apt-get upgrade command on a Linux operating system. What is the purpose of this command?ITExamAnswers asked 4 years ago • CCNA CyberOps, DevNet, Endpoint Security, Operating Systems BasicsA system administrator issues the command ps on a server that is running the Linux operating system. What is the purpose of this command?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IoT Connecting Things, Operating Systems BasicsIn the context of a Linux operating system, which command can be used to display the syntax and parameters for a specific command?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IT Essentials, Operating Systems BasicsAn author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityA security incident has been filed and an employee believes that someone has been on the computer since the employee left last night. The employee states that the computer was turned off before the employee left for the evening. The computer is running slowly and applications are acting strangely. Which Microsoft Windows tool would be used by the security analyst to determine if and when someone logged on to the computer after working hours?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich net command is used on a Windows PC to establish a connection to a shared directory on a remote server?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich command is used to manually query a DNS server to resolve a specific host name?IT Administrator asked 4 years ago • CCNA, CCNA CyberOps, Endpoint Security, Operating Systems Basics