IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsAn administrator is trying to develop a BYOD security policy for employees that are bringing a wide range of devices to connect to the company network. Which three objectives must the BYOD security policy address? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich three services are provided through digital signatures? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat are two disadvantages of using an IDS? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat are two examples of DoS attacks? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, CCNA SecurityWhich two statements describe the characteristics of symmetric algorithms? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityMatch the network security testing technique with how it is used to test network security. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is an advantage of HIPS that is not provided by IDS?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich two algorithms use a hashing function to ensure message integrity? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich data security component is provided by hashing algorithms?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is a feature of asymmetrical encryption?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich type of attack does the use of HMACs protect against?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich security function is provided by encryption algorithms?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is the focus of cryptanalysis?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityA network security specialist is tasked to implement a security measure that monitors the status of critical files in the data center and sends an immediate alert if any file is modified. Which aspect of secure communications is addressed by this security measure?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat are two monitoring tools that capture network traffic and forward it to network monitoring devices? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security