IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA 3 v7Which two statement describes a difference between the operation of inbound and outbound ACLs? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v7Which two characteristics are shared by standard and extended ACLs? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v7Which three statements are best practices related to placement of ACLs? (Choose three.)ITExamAnswers asked 2 years ago • CCNA 3 v7Which three statements describe how an ACL processes packets? (Choose three.)ITExamAnswers asked 2 years ago • CCNA 3 v7What two functions describe uses of access control lists? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v7Which of the following guarantees that the sender cannot repudiate, or refute, the validity of a message sent?ITExamAnswers asked 2 years ago • CCNA 3 v7What term is used to describe a mechanism that takes advantage of a vulnerability?ITExamAnswers asked 2 years ago • CCNA 3 v7What term is used to describe a guarantee that a message is not a forgery and does actually come from the person who is supposed to have sent it?ITExamAnswers asked 2 years ago • CCNA 3 v7What is the term used to describe a potential danger to a company’s assets, data, or network functionality?ITExamAnswers asked 4 years ago • CCNA 3 v7What is the term used to describe unethical criminals who compromise computer and network security for personal gain, or for malicious reasons?IT Administrator asked 4 years ago • CCNA 3 v7Which of the following is true of an IPS?ITExamAnswers asked 2 years ago • CCNA 3 v7What are the SHA hash generating algorithms used for?ITExamAnswers asked 2 years ago • CCNA 3 v7What is used to decrypt data that has been encrypted using an asymmetric encryption algorithm public key?ITExamAnswers asked 2 years ago • CCNA 3 v7How are zombies used in security attacks?ITExamAnswers asked 2 years ago • CCNA 3 v7What is a ping sweep?ITExamAnswers asked 4 years ago • CCNA 3 v7, CCNA Security, CCNA Security v1.2