IT Questions Bank Which of the following guarantees that the sender cannot repudiate, or refute, the validity of a message sent?ITExamAnswers asked 2 years ago • CCNA 3 v7What term is used to describe a mechanism that takes advantage of a vulnerability?ITExamAnswers asked 2 years ago • CCNA 3 v7What term is used to describe a guarantee that a message is not a forgery and does actually come from the person who is supposed to have sent it?ITExamAnswers asked 2 years ago • CCNA 3 v7What is the term used to describe a potential danger to a company’s assets, data, or network functionality?ITExamAnswers asked 4 years ago • CCNA 3 v7What is the term used to describe unethical criminals who compromise computer and network security for personal gain, or for malicious reasons?IT Administrator asked 4 years ago • CCNA 3 v7Which of the following is true of an IPS?ITExamAnswers asked 2 years ago • CCNA 3 v7What are the SHA hash generating algorithms used for?ITExamAnswers asked 2 years ago • CCNA 3 v7What is used to decrypt data that has been encrypted using an asymmetric encryption algorithm public key?ITExamAnswers asked 2 years ago • CCNA 3 v7How are zombies used in security attacks?ITExamAnswers asked 2 years ago • CCNA 3 v7What is a ping sweep?ITExamAnswers asked 4 years ago • CCNA 3 v7, CCNA Security, CCNA Security v1.2A user receives a call from someone in IT services, asking her to confirm her username and password for auditing purposes. Which security threat does this represent?ITExamAnswers asked 2 years ago • CCNA 3 v7What is Trojan horse malware?ITExamAnswers asked 2 years ago • CCNA 3 v7Which type of hacker is motivated by protesting political and social issues?ITExamAnswers asked 2 years ago • CCNA 3 v7What commonly motivates cybercriminals to attack networks as compared to hacktivists or statesponsored hackers?ITExamAnswers asked 2 years ago • CCNA 3 v7Which network security statement is true?ITExamAnswers asked 2 years ago • CCNA 3 v7