IT Questions Bank What is the purpose of a personal firewall on a computer?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint SecurityMatch the type of cyberattackers to the description. (Not all options are used.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhat is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, Network Support and SecurityWhich term describes a field in the IPv4 packet header used to detect corruption in the IPv4 header?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Endpoint SecurityWhat is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Cybersecurity Essentials, Endpoint Security, Network Support and Security, Networking EssentialsAt a local college, students are allowed to connect to the wireless network without using a password. Which mode is the access point using?ITExamAnswers asked 4 years ago • CCNA, CCNP, Endpoint SecurityWhich device in a LAN infrastructure is susceptible to MAC address-table overflow and spoofing attacks?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich file system is the primary file system used by Apple in current Macintosh computers?ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, Endpoint Security, IT Essentials 8, Operating Systems BasicsWhich Windows tool can be used by a cybersecurity administrator to secure stand-alone computers that are not part of an active directory domain?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhy would a rootkit be used by a hacker?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint Security, Operating Systems BasicsWhat is an IPS signature?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhat does the term vulnerability mean?ITExamAnswers asked 4 years ago • Cybersecurity Essentials, Endpoint SecurityWhich language is used to query a relational database?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat is the primary means for mitigating virus and Trojan horse attacks?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint Security, Networking EssentialsWhen considering network security, what is the most valuable asset of an organization?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint Security