IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsMatch the network security device type with the description.IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is a feature of an IPS?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA, CCNA SecurityMatch the information security component with the description. answered 4 years ago • CCNA CyberOps, CCNA SecurityWhich statement describes a difference between RADIUS and TACACS+?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNPWhat does the TACACS+ protocol provide in a AAA deployment?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich protocol or service is used to automatically synchronize the software clocks on Cisco routers?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich evasion method describes the situation that after gaining access to the administrator password on a compromised host, a threat actor is attempting to login to another host using the same credentials?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNPThe following message was encrypted using a Caesar cipher with a key of 2: fghgpf vjg ecuvng What is the plaintext message?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is the purpose for using digital signatures for code signing?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich statement describes the function of the SPAN tool used in a Cisco switch?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is a network tap?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat are two characteristics of the RADIUS protocol? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityA network administrator is configuring an AAA server to manage TACACS+ authentication. What are two attributes of TACACS+ authentication? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is the only attribute used by standard access control lists to identify traffic?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNP