IT Questions Bank Which method can be used to harden a device?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich type of networks poses increasing challenges to cybersecurity specialists due to the growth of BYOD on campus?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhat would be a reason for a computer user to use the Task Manager Performance tab?ITExamAnswers asked 4 years ago • IT Essentials, Endpoint Security, Operating Systems BasicsWhich two options can limit the information discovered from port scanning? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhich type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityA flood of packets with invalid source IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack has occurred?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich term is used for bulk advertising emails flooded to as many end users as possible?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat is the purpose of the cd\ command?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsAs described by the SANS Institute, which attack surface includes the exploitation of vulnerabilities in wired and wireless protocols used by IoT devices?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat three tasks are accomplished by a comprehensive security policy? (Choose three.)ITExamAnswers asked 2 years ago • Cyber Threat Management, Cybersecurity Essentials, Endpoint SecurityWhat would be displayed if the netstat -abno command was entered on a Windows PC?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat is the first line of defense to protect a device from improper access control?ITExamAnswers asked 2 years ago • Endpoint SecurityWhat occurs when a rogue access point is added to a WLAN?ITExamAnswers asked 2 years ago • CCNA 3 v4, Endpoint SecurityA client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, IT Essentials 8, Networking Basics, Networking Essentials, Operating Systems BasicsWhich two attacks target web servers through exploiting possible vulnerabilities of input functions used by an application? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, DevNet, Endpoint Security