IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNAWhich of the following is required when configuring port security with sticky learning?ITExamAnswers asked 2 years ago • CCNASome IOS commands store passwords as clear text, but you can then encrypt the passwords with the service password-encryption global command. By comparison, other commands store a computed hash of the password instead of storing the password. Comparing the two options, which one answer is the most accurate about why one method is better than the other?ITExamAnswers asked 2 years ago • CCNAWhich actions show a behavior typically supported by a Cisco next-generation IPS (NGIPS) beyond the capabilities of a traditional IPS? (Choose two answers)ITExamAnswers asked 2 years ago • CCNAA next-generation firewall sits at the edge of a company’s connection to the Internet. It has been configured to prevent Telnet clients residing in the Internet from accessing Telnet servers inside the company. Which of the following might a next-generation firewall use that a traditional firewall would not?ITExamAnswers asked 2 years ago • CCNAA single-line ACL has been added to a router configuration using the command ip access-list 1 permit 172.16.4.0 0.0.1.255. The configuration also includes the access-class 1 in command in VTY configuration mode. Which answer accurately describes how the router uses ACL 1?ITExamAnswers asked 2 years ago • CCNAA network engineer issues a show running-config command and sees only one line of output that mentions the enable secret command, as follows:ITExamAnswers asked 2 years ago • CCNAPhysical access control is important for which one of the following reasons?ITExamAnswers asked 2 years ago • CCNAWhich one of the following is an example of a AAA server?ITExamAnswers asked 2 years ago • CCNAWhich one of the following is the goal of a brute-force attack?ITExamAnswers asked 2 years ago • CCNADuring a successful man-in-the-middle attack, which two of the following actions is an attacker most likely to perform?ITExamAnswers asked 2 years ago • CCNAIn a reflection attack, the source IP address in the attack packets is spoofed so that it contains which one of the following entities?ITExamAnswers asked 2 years ago • CCNASuppose an attacker sends a series of packets toward a destination IP address with the TCP SYN flag set but sends no other packet types. Which of the following attacks is likely taking place?ITExamAnswers asked 2 years ago • CCNAIn a spoofing attack, which of the following parameters are commonly spoofed? (Choose two answers.)ITExamAnswers asked 2 years ago • CCNAAn actual potential to exploit a vulnerability is known as which one of the following terms?ITExamAnswers asked 2 years ago • CCNAWhich one of the following terms means anything that can be considered to be a weakness that can compromise security?ITExamAnswers asked 2 years ago • CCNA