IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhen using Cisco IOS zone-based policy firewall, where is the inspection policy applied?IT Administrator asked 3 years ago • CCNA Security, CCNA Security v1.2, Network DefenseRefer to the exhibit. A network administrator configures AAA authentication on R1. Which statement describes the effect of the keyword single-connection in the configuration?IT Administrator asked 3 years ago • CCNA Security, CCNA Security v1.2Which two features are included by both TACACS+ and RADIUS protocols? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich authentication method stores usernames and passwords in the router and is ideal for small networks?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNA Security v1.2What command must be issued on a Cisco router that will serve as an authoritative NTP server?IT Administrator asked 3 years ago • CCNA, CCNA Security, CCNA Security v1.2Which three types of views are available when configuring the role-based CLI access feature? (Choose three.)ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Which two characteristics apply to role-based CLI access superviews? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Which set of commands are required to create a username of admin, hash the password using MD5, and force the router to access the internal username database when a user attempts to access the console?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?ITExamAnswers asked 3 years ago • CCNA, CCNA Security, CCNA Security v1.2Which three areas of router security must be maintained to secure an edge router at the network perimeter? (Choose three.)ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Refer to the exhibit. Based on the output of the show running-config command, which type of view is SUPPORT?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Which recommended security practice prevents attackers from performing password recovery on a Cisco IOS router for the purpose of gaining access to the privileged EXEC mode?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2If AAA is already enabled, which three CLI steps are required to configure a router with a specific view? (Choose three.)ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2Refer to the exhibit. What two pieces of information can be gathered from the generated message? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2What causes a buffer overflow?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, CCNA Security v1.2