IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich AAA component can be established using token cards?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseBecause of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA, CCNA Security, Network DefenseWhat is the purpose of the network security accounting function?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Network DefenseWhich component is a pillar of the zero trust security approach that focuses on the secure access of devices, such as servers, printers, and other endpoints, including devices attached to IoT?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich type of access control applies the strictest access control and is commonly used in military or mission critical applications?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhen a security audit is performed at a company, the auditor reports that new users have access to network resources beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occurring?ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, Network DefenseWhat three goals does a BYOD security policy accomplish? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseAn administrator discovers that a user is accessing a newly established website that may be detrimental to company security. What action should the administrator take first in terms of the security policy?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich section of a security policy is used to specify that only authorized individuals should have access to enterprise data?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat component of a security policy explicitly defines the type of traffic allowed on a network and what users are allowed and not allowed to do?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhat is the benefit of a defense-in-depth approach?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWith the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich device in a layered defense-in-depth approach denies connections initiated from untrusted networks to internal networks, but allows internal users within an organization to connect to untrusted networks?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich device is usually the first line of defense in a layered defense-in-depth approach?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseIn a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Network Defense