IT Questions Bank What is a difference between symmetric and asymmetric encryption algorithms?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Cybersecurity EssentialsWhat type of attack disrupts services by overwhelming network devices with bogus traffic?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Introduction to CybersecurityBecause of a pandemic, a company decides to let employees work from home. What security technology should be implemented to ensure that data communications between the employees and the company’s network remain confidential?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhich method of wireless authentication can take advantage of identity verification using a Radius server?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhich of the following protocols use the Advanced Encryption Standard (AES)? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhich of the following are commonly used port scanning applications? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat information must now be entered to specify which traffic can be sent across the zones and associate it with the zone-pair configuration?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsRefer to the exhibit. A router is configured with a zone-based policy firewall as shown. Which two statements describe how traffic between the LAN and external hosts will be processed? (Choose two.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhich tool is integrated into the Security Onion and displays full packet captures for analysis?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA cyber security analyst is reviewing security alerts in Sguil. What are three pieces of information included in an alert to identify the device generating the alert? (Choose three.)ITExamAnswers asked 1 year ago • Cybersecurity EssentialsA threat actor is using ping to discover hosts on a network. What type of attack is taking place?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsWhat is the most compressed representation of the IPv6 address 2001:0db8:0000:abcd:0000:0000:0000:0001?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsMatch the security policy to its description.ITExamAnswers asked 1 year ago • Cybersecurity EssentialsAn administrator has been granted top security clearance at a company. One day the administrator finds that certain confidential documents cannot be accessed. The administrator asks the IT team to verify the level of clearance and receives the confirmation that top security clearance is still valid. What could be the reason that the administrator cannot access the respective documents?ITExamAnswers asked 1 year ago • Cybersecurity EssentialsThe IT team in a company discovers that some employees are visiting newly established websites that are deemed inappropriate for conducting company business. What is the first action that the IT team should take in terms of the security policies?ITExamAnswers asked 1 year ago • Cybersecurity Essentials