IT Questions Bank Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer?ITExamAnswers asked 2 years ago • Introduction to Cybersecurity, Networking EssentialsHow does a phisher typically contact a victim?ITExamAnswers asked 1 year ago • Networking EssentialsWhich type of attack attempts to overwhelm network links and devices with useless data?ITExamAnswers asked 1 year ago • Networking EssentialsWhat type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?ITExamAnswers asked 1 year ago • Networking EssentialsWhich malicious program appears as a legitimate program to deceive the victim, but is in fact an attack tool that can contain malicious code?ITExamAnswers asked 1 year ago • Networking EssentialsWhat type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?ITExamAnswers asked 3 years ago • Networking EssentialsWhat is an example of social engineering?ITExamAnswers asked 1 year ago • Networking EssentialsWhat technology enables a cell phone to be used as a hands-free device?ITExamAnswers asked 4 years ago • IT Essentials, Networking Basics, Networking EssentialsWhich statement describes a characteristic of cloud computing?ITExamAnswers asked 4 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8, Networking EssentialsWhich technology provides a solution for PC virtualization?ITExamAnswers asked 4 years ago • Networking EssentialsWhat type of internet connection would be best for a residence in a remote area without mobile phone coverage or wired connectivity?ITExamAnswers asked 2 years ago • Networking Basics, Networking EssentialsA company uses a cloud-based payroll system. Which cloud computing technology is this company using?ITExamAnswers asked 4 years ago • CCNA, IT Essentials, IT Essentials 8, Networking EssentialsWhat would a technician require in order to install a hypervisor on a client machine?ITExamAnswers asked 4 years ago • Networking EssentialsWhich technology virtualizes the network control plane and moves it to a centralized controller?ITExamAnswers asked 4 years ago • Networking EssentialsWhich term is used to describe the process of establishing a connection between any two Bluetooth devices?ITExamAnswers asked 1 year ago • Networking Essentials