IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA Security v1.2What occurs after RSA keys are generated on a Cisco router to prepare for secure device management?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Endpoint SecurityRefer to the exhibit. Which statement describes the function of the ACEs?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2, Network DefenseIn a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseRefer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNA Security v1.2Which three security services are provided by digital signatures? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseTo facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?ITExamAnswers asked 3 years ago • CCNA, CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich command is used to activate an IPv6 ACL named ENG_ACL on an interface so that the router filters traffic prior to accessing the routing table?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v5, CCNA Security, CCNA Security v1.2, CCNP, Network DefenseA disgruntled employee is using Wireshark to discover administrative Telnet usernames and passwords. What type of network attack does this describe?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Endpoint SecurityWhat is a feature of the TACACS+ protocol?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Endpoint SecurityWhat is the main difference between the implementation of IDS and IPS devices?IT Administrator asked 3 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Endpoint SecurityWhat are two characteristics of SNMP community strings? (Choose two.)IT Administrator asked 3 years ago • CCNA, CCNA Security v1.2Refer to the exhibit. An administrator is examining the message in a syslog server. What can be determined from the message?ITExamAnswers asked 4 years ago • CCNA, CCNA Security v1.2What is a ping sweep?ITExamAnswers asked 4 years ago • CCNA 3 v7, CCNA Security, CCNA Security v1.2Which two statements correctly describe certificate classes used in the PKI? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network Defense