IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsWhich statement describes a typical security policy for a DMZ firewall configuration?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich two features are included by both TACACS+ and RADIUS protocols? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich technology provides the framework to enable scalable access security?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security v1.2What causes a buffer overflow?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, CCNA Security v1.2What is a characteristic of a Trojan horse as it relates to network security?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2Which access attack method involves a software program that attempts to discover a system password by the use of an electronic dictionary?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security v1.2Which two statements describe access attacks? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2A network administrator detects unknown sessions involving port 21 on the network. What could be causing this security breach?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security v1.2What are the three major components of a worm attack? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2Which two statements are characteristics of a virus? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2Users report to the helpdesk that icons usually seen on the menu bar are randomly appearing on their computer screens. What could be a reason that computers are displaying these random graphics?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security v1.2A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Networking BasicsWhat addresses are mapped by ARP?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Networking BasicsRefer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next? answered 4 years ago • CCNA, CCNA CyberOps, Networking BasicsA host is transmitting a broadcast. Which host or hosts will receive it?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, Networking Basics