IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA Discovery v4A user is able to ping an FTP server across a WAN but is unable to download files from the server. What should be checked to resolve this problem?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which statement is true about FTP implementations?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, CCNA Discovery v4, IT Essentials 8When is the use of out-of-band network management necessary?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which of the following does SNMP use to hold information collected about the network?ITExamAnswers asked 7 months ago • CCNA Discovery v4What AAA component assigns varying levels of rights to users of network resources?ITExamAnswers asked 7 months ago • CCNA Discovery v4What are two potential problems with using tape media to back up server data? (Choose two.)ITExamAnswers asked 7 months ago • CCNA Discovery v4Before a technician upgrades a server, it is necessary to back up all data. Which type of backup is necessary to ensure that all data is backed up?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which benefit does SSH offer over Telnet when remotely managing a router?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which three protocols describe methods that can be used to secure user data for transmission across the internet? (Choose three.)ITExamAnswers asked 7 months ago • CCNA Discovery v4What is the term for the public network between the boundary router and the firewall?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which three protocols are used for in-band management? (Choose three.)ITExamAnswers asked 7 months ago • CCNA Discovery v4What is the advantage of using WPA to secure a wireless network?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.)ITExamAnswers asked 7 months ago • CCNA Discovery v4What network layer security protocol can secure any application layer protocol used for communication?ITExamAnswers asked 7 months ago • CCNA Discovery v4