IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsFor security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhen a user makes changes to the settings of a Windows system, where are these changes stored?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint Security, Operating Systems BasicsWhat are two drawbacks to using HIPS? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhat is a characteristic of the WLAN passive discover mode?IT Administrator asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat is a vulnerability that allows criminals to inject scripts into web pages viewed by users?IT Administrator asked 4 years ago • CCNA CyberOps, Cybersecurity Essentials, Endpoint SecurityA disgruntled employee is using Wireshark to discover administrative Telnet usernames and passwords. What type of network attack does this describe?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Endpoint SecurityWhat network monitoring technology enables a switch to copy and forward traffic sent and received on multiple interfaces out another interface toward a network analysis device?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhat is a function of a proxy firewall?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityHow is a source IP address used in a standard ACL?ITExamAnswers asked 4 years ago • CCNA CyberOps, Endpoint SecurityWhich two statements are true about NTP servers in an enterprise network? (Choose two.)ITExamAnswers asked 4 years ago • CCNA 2 v6, CCNA 3 v7, CCNA CyberOps, CCNP, DevNet, Endpoint SecurityWhich statement describes the Cisco Cloud Web Security?ITExamAnswers asked 3 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityRefer to the exhibit. The network “A” contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as “A”?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhich firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Endpoint SecurityWhat is a feature of the TACACS+ protocol?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Endpoint SecurityWhat is the main difference between the implementation of IDS and IPS devices?IT Administrator asked 3 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Endpoint Security