IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA 1 v7Which option describes a network attack that occurs on the first day that a vulnerability becomes known?ITExamAnswers asked 2 years ago • CCNA 1 v7Which option blocks unauthorized access to your network?ITExamAnswers asked 2 years ago • CCNA 1 v7Which option creates a secure connection for remote workers?ITExamAnswers asked 2 years ago • CCNA 1 v7Which attack slows down or crashes equipment and programs?ITExamAnswers asked 2 years ago • CCNA 1 v7Which feature uses the same cellular technology as a smart phone?ITExamAnswers asked 2 years ago • CCNA 1 v7Which feature is being used when connecting a device to the network using an electrical outlet?ITExamAnswers asked 2 years ago • CCNA 1 v7Which feature contains options such as Public, Private, Custom and Hybrid?ITExamAnswers asked 2 years ago • CCNA 1 v7Which feature describes using personal tools to access information and communicate across a business or campus network?ITExamAnswers asked 2 years ago • CCNA 1 v7Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?ITExamAnswers asked 2 years ago • CCNA 1 v7Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?ITExamAnswers asked 2 years ago • CCNA 1 v7With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?ITExamAnswers asked 2 years ago • CCNA 1 v7Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?ITExamAnswers asked 2 years ago • CCNA 1 v7When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?ITExamAnswers asked 2 years ago • CCNA 1 v7Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?ITExamAnswers asked 2 years ago • CCNA 1 v7Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data?ITExamAnswers asked 2 years ago • CCNA 1 v7