IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhich statement describes a feature of a zone-based policy firewall?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhen implementing a ZPF, which statement describes a zone?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseHow does a firewall handle traffic that is originating from the DMZ network and traveling to a private network?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich type of traffic is usually blocked when implementing a demilitarized zone?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich two protocols are stateless and do not generate connection information needed to build a state table? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich type of firewall generally has a low impact on network performance?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich three layers of the OSI model include information that is commonly inspected by a stateful firewall? (Choose three.)ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich type of firewall is commonly part of a router firewall and allows or blocks traffic based on Layer 3 or 4 information?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhat are two benefits of implementing a firewall in a network? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhat are two characteristics of an application gateway firewall? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich statement is a characteristic of a packet filtering firewall?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseConsider the following access list. Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhat is the quickest way to remove a single ACE from a named ACL?ITExamAnswers asked 4 years ago • CCNA Security, Network DefenseWhich scenario would cause an ACL misconfiguration and deny all traffic?ITExamAnswers asked 3 years ago • CCNA, CCNA Security, Network DefenseRefer to the exhibit. A network administrator is configuring an IPv6 ACL to allow hosts on the 2001:DB8:CAFÉ:10::/64 network to access remote web servers, except for PC1. However, a user on PC1 can successfully access the web server PC2. Why is this possible?ITExamAnswers asked 3 years ago • CCNA Security, CCNP, Network Defense