IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhat is a zero-day attack?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Refer to the exhibit. Based on the configuration that is shown, which statement is true about the IPS signature category?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Which statement is true about an atomic alert that is generated by an IPS?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Which two benefits does the IPS version 5.x signature format provide over the version 4.x signature format? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Refer to the exhibit. What is the result of issuing the Cisco IOS IPS commands on router R1?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2What is a disadvantage of network-based IPS as compared to host-based IPS?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2An IPS sensor has detected the string confidential across multiple packets in a TCP session. Which type of signature trigger and signature type does this describe?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2In addition to the criteria used by extended ACLs, what conditions are used by a classic firewall to filter traffic?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Refer to the exhibit. Which statement is true about the effect of this Cisco IOS zone-based policy firewall configuration?IT Administrator asked 3 years ago • CCNA Security, CCNA Security v1.2Which statement describes a typical security policy for a DMZ firewall configuration?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhat are two characteristics of ACLs? (Choose two.)IT Administrator asked 3 years ago • CCNA Security, CCNA Security v1.2Refer to the exhibit. The ACL statement is the only one explicitly configured on the router. Based on this information, which two conclusions can be drawn regarding remote access network connections? (Choose two.)ITExamAnswers asked 3 years ago • CCNP, CCNA Security, CCNA Security v1.2Which zone-based policy firewall zone is system-defined and applies to traffic destined for the router or originating from the router?IT Administrator asked 3 years ago • CCNA Security, CCNA Security v1.2, Network DefenseRefer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Which type of packet is unable to be filtered by an outbound ACL?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2