IT Questions Bank Which attack is being used when threat actors initiate a simultaneous, coordinated attack from multiple source machines?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack is being used when threat actors gain access to the physical network, and then use an MiTM attack to capture and manipulate a legitimate user’s traffic?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich attack is being used when threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps AssociateWhich utility provides numerous command-line options for capturing packets?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich tool is used in enterprise organizations to provide real time reporting and long-term analysis of security events?ITExamAnswers asked 2 years ago • CyberOps AssociateWhich tool can be used for network and security monitoring, network planning, and traffic analysis?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat application captures frames that are saved in a file that contains the frame information, interface information, packet length, and time stamps?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat allows analysts to request and receive information about the operation of network devices?ITExamAnswers asked 2 years ago • CyberOps AssociateWhat is the weakest link in network security?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What type of attack is port scanning?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps Associate, Network Security 1.0What type of attack is tailgating?ITExamAnswers asked 2 years ago • CCNA 3 v7, CyberOps Associate, Network Security 1.0What is the weakest link in network security?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What type of malware attempts to convince people to divulge their personally identifable information (PII)?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What type of malware encrypts all data on a drive and demands payment in Bitcoin cryptocurrence to unencrypt the files?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0What type of malware typically displays annoying pop-ups to generate revenue for its author?ITExamAnswers asked 2 years ago • CyberOps Associate, Network Security 1.0