IT Questions Bank Mar 16, 2020 Last Updated: Apr 13, 2022 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA Security v1.2What is a ping sweep?ITExamAnswers asked 3 years ago • CCNA 3 v7, CCNA Security, CCNA Security v1.2To facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?ITExamAnswers asked 2 years ago • CCNA, CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich two statements correctly describe certificate classes used in the PKI? (Choose two.)IT Administrator asked 2 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich statement is a feature of HMAC?ITExamAnswers asked 2 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich statement accurately describes Cisco IOS Zone-Based Policy Firewall operation?ITExamAnswers asked 2 years ago • CCNA Security, CCNA Security v1.2, Network DefenseWhich statement describes a factor to be considered when configuring a zone-based policy firewall?ITExamAnswers asked 2 years ago • CCNA Security, CCNA Security v1.2, Network DefenseWhich three statements describe zone-based policy firewall rules that govern interface behavior and the traffic moving between zone member interfaces? (Choose three.)ITExamAnswers asked 2 years ago • CCNA Security, CCNA Security v1.2, Network DefenseRefer to the exhibit. Which statement describes the function of the ACEs?ITExamAnswers asked 2 years ago • CCNA Security, CCNA Security v1.2, Network DefenseWhich two statements describe appropriate general guidelines for configuring and applying ACLs? (Choose two.)ITExamAnswers asked 2 years ago • CCNA, CCNA Security, CCNA Security v1.2, Network DefenseAn administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)ITExamAnswers asked 3 years ago • CCNP, CCNA Security, CCNA Security v1.2, Networking Devices and Initial Configuration, Networking EssentialsWhich type of NAT would be used on an ASA where 10.0.1.0/24 inside addresses are to be translated only if traffic from these addresses is destined for the 198.133.219.0/24 network?ITExamAnswers asked 2 years ago • CCNA Security, CCNA Security v1.2Fill in the blank. When role-based CLI is used, only the view has the ability to add or remove commands from existing views.ITExamAnswers asked 4 months ago • CCNA Security v1.2Place the system development cycle (SDLC) phases in the order they occur (Not all options are used)ITExamAnswers asked 4 months ago • CCNA Security v1.2A user complains about not being able to gain access to the network. What command would be used by the network administrator to determine which AAA method list is being used for this particular user as the user logs on?ITExamAnswers asked 2 years ago • CCNA Security, CCNA Security v1.2, CCNPWhat is an example of toll fraud?ITExamAnswers asked 4 months ago • CCNA Security v1.2