IT Questions Bank A secretary receives a phone call from someone claiming that their manager is about to give an important presentation but the presentation files are corrupted. The caller sternly asks that the secretary email the presentation right away to a personal email address. The caller also states that the secretary is being held personally responsible for the success of this presentation. What type of social engineering tactic is the caller using?ITExamAnswers asked 12 months ago • Endpoint Security, IT Essentials 8, Network Support and SecurityWhich statement describes the term attack surface?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhich wireless encryption method is the most secure?ITExamAnswers asked 4 years ago • CCNP, Endpoint SecurityWhich statement describes the term iptables?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityMatch typical Linux log files to the function.IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat kind of ICMP message can be used by threat actors to map an internal IP network?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint SecurityWhich technology is used to secure, monitor, and manage mobile devices?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhat is a daemon?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat principle prevents the disclosure of information to unauthorized people, resources, and processes?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityA user creates a file with .ps1 extension in Windows. What type of file is it?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhich Linux command can be used to display the name of the current working directory?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsA cybercriminal sends a series of maliciously formatted packets to a database server, which causes the server to crash. What do you call this type of attack?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityA new PC is taken out of the box, started up and connected to the Internet. Patches were downloaded and installed. Antivirus was updated. In order to further harden the operating system what can be done?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint SecurityWhich protocol provides authentication, integrity, and confidentiality services and is a type of VPN?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhat technology was created to replace the BIOS program on modern personal computer motherboards?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems Basics