IT Questions Bank What is the result of a DHCP starvation attack?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityMatch the network-based anti-malware solution to the function. (Not all options are used.)ITExamAnswers asked 2 years ago • Endpoint SecurityWhich of the following statements describes a distributed denial of service (DDoS) attack?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhich security technology is commonly used by a teleworker when accessing resources on the main corporate office network?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhat does a rootkit modify?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, Network Support and SecurityWhat are three states of data during which data is vulnerable? (Choose three.)ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityIn Windows Firewall, when is the Domain profile applied?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityConsider the result of the ls -l command in the Linux output below. What are the file permissions assigned to the sales user for the analyst.txt file?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich statement describes a VPN?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Endpoint SecurityWhat is the reason for disabling SSID broadcasting and changing the default SSID on a wireless access point?IT Administrator asked 4 years ago • Endpoint SecurityWhat is the motivation of a white hat attacker?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint Security, Introduction to CybersecurityWhich wireless parameter refers to the frequency bands used to transmit data to a wireless access point?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich antimalware software approach can recognize various characteristics of known malware files to detect a threat?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityA threat actor uses a program to launch an attack by sending a flood of UDP packets to a server on the network. The program sweeps through all of the known ports trying to find closed ports. It causes the server to reply with an ICMP port unreachable message and is similar to a DoS attack. Which two programs could be used by the threat actor to launch the attack? (Choose two.)ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IoT SecurityHow much RAM is addressable by a 32-bit version of Windows?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security