IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNAWhat method is used to apply an IPv6 ACL to a router interface?ITExamAnswers asked 4 years ago • CCNA, CCNA 4 v6, CCNP, Network DefenseWhich technique is necessary to ensure a private transfer of data using a VPN?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, CCNA Security, Network DefenseA company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Network DefenseWhich operator is used in an ACL statement to match packets of a specific application?ITExamAnswers asked 3 years ago • CCNA, CCNA Security, Network DefenseA company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Network DefenseWhat single access list statement matches all of the following networks?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, Network DefenseRefer to the exhibit. While planning an upgrade, a network administrator uses the Cisco NetFlow utility to analyze data flow in the current network. What generated the most packets?ITExamAnswers asked 1 year ago • CCNA, CCNA Discovery v4Refer to the exhibit. The named ACL “Managers” already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?IT Administrator asked 2 years ago • CCNA, CCNA Discovery v4A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?ITExamAnswers asked 4 years ago • CCNA, CCNA Discovery v4Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNA Security v1.2A router has been removed from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should be done before placing the router back into service?ITExamAnswers asked 4 years ago • CCNA, CCNA Discovery v4ACLs are used primarily to filter traffic. What are two additional uses of ACLs? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v5, CCNA Discovery v4, CCNA Security, CCNPWhen should EIGRP automatic summarization be turned off?ITExamAnswers asked 4 years ago • CCNA, CCNA Discovery v4How do EIGRP routers establish and maintain neighbor relationships?ITExamAnswers asked 4 years ago • CCNP, CCNA, CCNA 3 v6, CCNA Discovery v4, CCNP ROUTEWhat is the purpose of a routing protocol?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v4, CCNA 2 v5, CCNA Discovery v4, CCNP