IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA 3 v7Which syslog logging severity level indicates that a device is unusable?ITExamAnswers asked 2 years ago • CCNA 3 v7Which of the following is one difference between CDP and LLDP?ITExamAnswers asked 2 years ago • CCNA 3 v7Which type of traffic does Cisco recommend be placed in the strict priority queue when Low Latency Queuing (LLQ) is being used?ITExamAnswers asked 2 years ago • CCNA 3 v7Which two descriptions correctly identify a GRE over IPsec VPN? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v7Which two descriptions correctly identify an IPsec VTI VPN? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v7Which description correctly identifies an SSL VPN?ITExamAnswers asked 2 years ago • CCNA 3 v7Which description correctly identifies an MPLS VPN?ITExamAnswers asked 2 years ago • CCNA 3 v7Which type of VPN connects using the Transport Layer Security (TLS) feature?ITExamAnswers asked 4 years ago • CCNA 3 v7Which type of VPN supports multiple sites by applying configurations to virtual interfaces instead of physical interfaces?IT Administrator asked 4 years ago • CCNA 3 v7Which type of VPN involves passenger, carrier, and transport protocols?IT Administrator asked 4 years ago • CCNA 3 v7How is the Diffie-Hellman algorithm used in the IPsec framework?ITExamAnswers asked 2 years ago • CCNA 3 v7Which is a requirement of a site-to-site VPN?ITExamAnswers asked 4 years ago • CCNA, CCNA 3 v7, CCNA SecurityWhich of the following are enterprise-managed remote-access VPNs? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v7Which of the following are service provider managed VPN solutions? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v7Which IPsec security function utilizes encryption to protect data transfers with a key?ITExamAnswers asked 2 years ago • CCNA 3 v7