IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA 4 v4What is the best defense for protecting a network from phishing exploits?ITExamAnswers asked 2 years ago • CCNA 4 v4Which step is required to recover a lost enable password for a router?ITExamAnswers asked 2 years ago • CCNA 4 v4Refer to the exhibit. A network administrator is trying to configure a router to use SDM, but it is not functioning correctly. What could be the problem?ITExamAnswers asked 2 years ago • CCNA 4 v4Refer to the exhibit. Security Device Manager (SDM) is installed on router R1. What is the result of opening a web browser on PC1 and entering the URL 192.168.10.1?ITExamAnswers asked 2 years ago • CCNA 4 v4The password recovery process begins in which operating mode and using what type of connection? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 4 v4Refer to the exhibit. The network administrator is trying to back up the Cisco IOS router software and receives the output shown. What are two possible reasons for this output? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 4 v4The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the filename c2600-d-mz.121-4? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 4 v4Which statement is true about Cisco Security Device Manager (SDM)?ITExamAnswers asked 2 years ago • CCNA 4 v4What are two benefits of using Cisco AutoSecure? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 4 v4An IT director has begun a campaign to remind users to avoid opening e-mail messages from suspicious sources. Which type of attack is the IT director trying to protect users from?ITExamAnswers asked 2 years ago • CCNA 4 v4Refer to the exhibit. Security Device Manager (SDM) has been used to configure a required level of security on the router. What would be accomplished when the SDM applies the next step on the security problems that are identified on the router?ITExamAnswers asked 2 years ago • CCNA 4 v4Which two statements define the security risk when DNS services are enabled on the network? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 4 v4Which two objectives must a security policy accomplish? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 4 v4Intrusion detection occurs at which stage of the Security Wheel?ITExamAnswers asked 2 years ago • CCNA 4 v4What are three characteristics of a good security policy? (Choose three.)ITExamAnswers asked 2 years ago • CCNA 4 v4