IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNAWhat is a similarly between 1000BASE-LX and 1000BASE-T standards?IT Administrator asked 3 years ago • CCNAWhich LAN attack prevents hosts from obtaining dynamically assigned IP addresses?IT Administrator asked 3 years ago • CCNARefer to the exhibit. A corporate network is using NTP to synchronize the time across devices. What can be determined from the displayed output?IT Administrator asked 4 years ago • CCNA, CCNA Security, CCNPWhat two types of always-on internet connections are commonly used by teleworkers to communicate with a company? (Choose two.)IT Administrator asked 4 years ago • CCNAWhich LAN attack involves a rogue server connected to the network providing false IP configuration parameters to legitimate clients?IT Administrator asked 4 years ago • CCNAWhat action takes place when a frame entering a switch has a unicast destination MAC address that is not in the MAC address table?ITExamAnswers asked 4 years ago • CCNAA network administrator configures a router with the ipv6 route ::/0 Serial2/0 command. What is the purpose of this command?IT Administrator asked 4 years ago • CCNAWhat action takes place when the source MAC address of a frame entering a switch is in the MAC address table?IT Administrator asked 4 years ago • CCNAA technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityWhat two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityWhat are two reasons to enable OSPF routing protocol authentication on a network? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityOpen the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which message is displayed on the web server?eng Yasir abdullahi answered 55 years ago • CCNAWhat are two examples of DoS attacks? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, CCNA SecurityRefer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityRefer to the exhibit. Which two conclusions can be drawn from the syslog message that was generated by the router? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNP