IT Questions Bank Mar 16, 2020 Last Updated: Apr 13, 2022 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhat represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?ITExamAnswers asked 3 years ago • CCNA 4 v6, CCNA SecurityWhat network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?ITExamAnswers asked 3 years ago • CCNA 4 v6, CCNA SecurityWhat protocol should be disabled to help mitigate VLAN hopping attacks?ITExamAnswers asked 2 years ago • CCNA 4 v6, CCNA SecurityWhich security feature should be enabled in order to prevent an attacker from overflowing the MAC address table of a switch?ITExamAnswers asked 2 years ago • CCNA, CCNA 4 v6, CCNA SecurityWhen SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?ITExamAnswers asked 2 years ago • CCNA, CCNA 4 v6, CCNA SecurityWhich statement describes SNMP operation?ITExamAnswers asked 3 years ago • CCNA 3 v7, CCNA 4 v6, CCNA SecurityWhich feature is unique to IPv6 ACLs when compared to those of IPv4 ACLs?ITExamAnswers asked 2 years ago • CCNA, CCNA 4 v6, CCNA Security, CCNPWhich three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)ITExamAnswers asked 3 years ago • CCNA, CCNA 2 v6, CCNA 4 v6, CCNA SecurityA network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)ITExamAnswers asked 3 years ago • CCNA, CCNA 2 v6, CCNA 4 v6, CCNA SecurityWhich two characteristics are shared by both standard and extended ACLs? (Choose two.)ITExamAnswers asked 2 years ago • CCNA, CCNA 4 v6, CCNA Security, CCNPWhich three statements describe ACL processing of packets? (Choose three.)ITExamAnswers asked 3 years ago • CCNP, CCNA, CCNA 2 v6, CCNA 4 v4, CCNA 4 v6, CCNA SecurityWhich statement describes a feature of site-to-site VPNs?IT Administrator asked 2 years ago • CCNA, CCNA 4 v6, CCNA SecurityWhich two protocols generate connection information within a state table and are supported for stateful filtering? (Choose two.)IT Administrator asked 2 years ago • CCNA Security, Network Security 1.0Which statement accurately describes dynamic NAT?IT Administrator asked 2 years ago • CCNA, CCNA 2 v6, CCNA Security, DevNet, Networking EssentialsWhat is one difference between using Telnet or SSH to connect to a network device for management purposes?ITExamAnswers asked 3 years ago • CCNA, CCNA 2 v6, CCNA 2 v7, CCNA Security, Networking Devices and Initial Configuration