CCNA 1 v7.0 Modules 1 – 3: Basic Network Connectivity and Communications Exam Answers 2020 1. During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of …
1. What is the main purpose of cyberwarfare? to protect cloud-based data centers to gain advantage over adversaries* to develop advanced network devices to simulate possible war scenarios among nations 2. A technician has installed a third party utility that is used to manage a Windows 7 computer. …
CCNA Cyber OPS v1.1 Chapter 13 Exam Answers 1. In the NIST incident response process life cycle, which type of attack vector involves the use of brute force against devices, networks, or services? Media Impersonation Attrition * Loss or theft 2. Which NIST incident response life cycle phase …
1. Which two technologies are used in the ELSA tool? (Choose two.) MySQL * CapME Suricata Sphinx Search * Security Onion 2. What is the host-based intrusion detection tool that is integrated into Security Onion? OSSEC * Snort Sguil Wireshark 3. According to NIST, which step in the …
1. Which statement describes the tcpdump tool? It is a command line packet analyzer. * It is used to control multiple TCP-based applications. It accepts and analyzes data captured by Wireshark. It can be used to analyze network log data in order to describe and predict network behavior. …
1. Which HIDS is an open source product? Tripwire OSSEC * Cisco AMP AlienVault USM 2. In Windows Firewall, when is the Domain profile applied? When the host accesses the Internet When the host checks emails from an enterprise email server When the host is connected to a …
It-essentials v7.0 Chapter 14 Exam Answers 1. What is a common responsibility of a level one call center technician? entering a concise description of a customer problem into a ticketing system * remotely connecting to customer devices and implementing driver and software updates calling back customers and asking …
It-essentials v7.0 Chapter 12-13 Checkpoint Exam Answers 1. Which two security precautions will help protect a workplace against social engineering? (Choose two.) performing daily data backups encrypting all sensitive data stored on the servers registering and escorting all visitors to the premises * ensuring that all operating system …
It-essentials v7.0 Chapter 13 Exam Answers 1. Which two items are used in asymmetric encryption? (Choose two.) a token a DES key a private key * a public key * a TPM 2. Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose …
It-essentials v7.0 Chapter 12 Exam Answers 1. Which two location data sources can locator apps use to determine the position of a mobile device? (Choose two.) cellular towers * WiFi hotspots * the sandbox remote lock an app source 2. What are two ways that iOS differs from …