IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsAn IT enterprise is recommending the use of PKI applications to securely exchange information between the employees. In which two cases might an organization use PKI applications to securely exchange information between users? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat is a key difference between the data captured by NetFlow and data captured by Wireshark?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhat is a characteristic of a layered defense-in-depth security approach?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich network monitoring tool is in the category of network protocol analyzers?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhat is the purpose of mobile device management (MDM) software?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich network service synchronizes the time across all devices on the network?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseIn a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhen designing a prototype network for a new server farm, a network designer chooses to use redundant links to connect to the rest of the network. Which business goal will be addressed by this choice?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Discovery v4What is the purpose of a rootkit?ITExamAnswers asked 4 years ago • CCNA CyberOps, Introduction to CybersecurityA server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?IT Administrator asked 3 years ago • CCNA CyberOps, CCNA Discovery v4, CCNA SecurityThe security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?ITExamAnswers asked 4 years ago • CCNA CyberOpsRefer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, CCNA Discovery v4, IT Essentials 8What information within a data packet does a router use to make forwarding decisions?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Discovery v4What are three techniques used in social engineering attacks? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Discovery v4What type of server would use IMAP?IT Administrator asked 3 years ago • CCNA CyberOps, CCNA Discovery v4, Networking Essentials