IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhich two non-secret numbers are initially agreed upon when the Diffie-Hellman algorithm is used? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Which type of cryptographic key would be used when connecting to a secure website?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Which characteristic of security key management is responsible for making certain that weak cryptographic keys are not used?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Two users must authenticate each other using digital certificates and a CA. Which option describes the CA authentication procedure?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2Refer to the exhibit. Which encryption algorithm is described in the exhibit?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Which encryption protocol provides network layer confidentiality?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Refer to the exhibit. Which type of cipher method is depicted?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2How do modern cryptographers defend against brute-force attacks?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Which statement describes asymmetric encryption algorithms?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?ITExamAnswers asked 4 years ago • CCNA Security, CCNA Security v1.2When the Cisco NAC appliance evaluates an incoming connection from a remote device against the defined network policies, what feature is being used?IT Administrator asked 3 years ago • CCNA Security, CCNA Security v1.2What is the goal of the Cisco NAC framework and the Cisco NAC appliance?IT Administrator asked 3 years ago • CCNA Security, CCNA Security v1.2Why are traditional network security perimeters not suitable for the latest consumer-based network endpoint devices?IT Administrator asked 3 years ago • CCNA Security, CCNA Security v1.2Refer to the exhibit. Based on the output generated by the show monitor session 1 command, how will SPAN operate on the switch?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNA Security v1.2, CCNPWhat is a disadvantage of a pattern-based detection mechanism?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2