IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhat type of ACL offers greater flexibility and control over network access?ITExamAnswers asked 4 years ago • CCNA Security, Network DefenseWhich two statements describe appropriate general guidelines for configuring and applying ACLs? (Choose two.)ITExamAnswers asked 3 years ago • CCNA, CCNA Security, CCNA Security v1.2, Network DefenseRefer to the exhibit. A network administrator wants to create a standard ACL to prevent network 1 traffic from being transmitted to the Research and Development network. On which router interface and in which direction should the standard ACL be applied?ITExamAnswers asked 3 years ago • CCNA Security, CCNP, Network DefenseWhich AAA component can be established using token cards?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseBecause of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA, CCNA Security, Network DefenseWhat is the purpose of the network security accounting function?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Network DefenseAn administrator discovers that a user is accessing a newly established website that may be detrimental to company security. What action should the administrator take first in terms of the security policy?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich section of a security policy is used to specify that only authorized individuals should have access to enterprise data?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWith the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseAn administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)ITExamAnswers asked 4 years ago • CCNP, CCNA Security, CCNA Security v1.2, Networking Devices and Initial Configuration, Networking EssentialsThe ARP table in a switch maps which two types of address together?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, Networking Basics, Networking Devices and Initial ConfigurationWhat network testing tool is used for password auditing and recovery?IT Administrator asked 3 years ago • CCNA Security, Cyber Threat ManagementA new person has joined the security operations team for a manufacturing plant. What is a common scope of responsibility for this person?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat network security testing tool has the ability to provide details on the source of suspicious network activity?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat is the purpose of the Tripwire network testing tool?IT Administrator asked 3 years ago • CCNA Security, Cyber Threat Management