IT Questions Bank Users in a company have complained about network performance. After investigation, the IT staff has determined that an attacker has used a specific technique that affects the TCP three-way handshake. What is the name of this type of network attack?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint SecurityOn a Windows host, which tool can be used to create and maintain blacklists and whitelists?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich two options are window managers for Linux? (Choose two.)IT Administrator asked 2 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsEmployees in an organization report that the network access is slow. Further investigation reveals that one employee downloaded a third-party scanning program for the printer. What type of malware may have been introduced?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Endpoint Security, Network Support and SecurityWhich Windows version was the first to introduce a 64-bit Windows operating system?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat is the function of the Cloud Security Alliance (CSA)?ITExamAnswers asked 2 years ago • Cyber Threat ManagementWhat are the steps in the vulnerability management life cycle?ITExamAnswers asked 2 years ago • CCNA CyberOps, Cyber Threat ManagementWhich meta-feature element in the Diamond Model describes information gained by the adversary?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhat network testing tool would an administrator use to assess and validate system configurations against security policies and compliance standards?IT Administrator asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat is a characteristic of CybOX?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich step in the Vulnerability Management Life Cycle performs inventory of all assets across the network and identifies host details, including operating system and open services?ITExamAnswers asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich type of evaluation includes the assessment of the likelihood of an attack, the type of threat actor likely to perpetrate such an attack, and what the consequences could be to the organization if the exploit is successful?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat ManagementWhich two types of controls are effective after a violation of a security policy occurs? (Choose two.)ITExamAnswers asked 2 years ago • Cyber Threat ManagementWhat type of security test uses simulated attacks to determine possible consequences of a real threat?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementWhich statement describes Trusted Automated Exchange of Indicator Information (TAXII)?IT Administrator asked 4 years ago • CCNA CyberOps, Cyber Threat Management