IT Questions Bank Which of the following uses a learned baseline model?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich of the following is a rule-based control and logging system for Linux?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich of the following uses a profile-based approach to configuring firewall functionality?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat allows Linux system administrators to configure network access rules that are part of the Linux kernel Netfilter modules?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich type of endpoint protection permits only authorized and compliant devices to connect to the network?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat provides filtering of websites and block listing to prevent endpoints from accessing malicious web pages?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich type of endpoint protection includes iptables and TCP Wrapper?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich type of antimalware software recognizes various characteristics of known malware files?ITExamAnswers asked 2 years ago • CyberOps AssociateTrue or False? Endpoints are hosts on the network that can access or be accessed by other hosts on the network.ITExamAnswers asked 2 years ago • CyberOps AssociateWhich hash function is the most secure?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0Which algorithm provides asymmetric encryption?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What is an example of a symmetric encryption algorithm?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0True or False? In asymmetric encryption, encryption and decryption use the same key.ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What are three threat intelligence information sharing specifications?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich security operations platform integrates and enhances a range of security tools and threat intelligence?ITExamAnswers asked 2 years ago • CyberOps Associate