IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhat is the primary means for mitigating virus and Trojan horse attacks?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint Security, Networking EssentialsWhen considering network security, what is the most valuable asset of an organization?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityRefer to the exhibit. An IT security manager is planning security updates on this particular network. Which type of network is displayed in the exhibit and is being considered for updates?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhat network testing tool would an administrator use to assess and validate system configurations against security policies and compliance standards?IT Administrator asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat type of security test uses simulated attacks to determine possible consequences of a real threat?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat information does the SIEM network security management tool provide to network administrators?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat is the primary function of SANS?ITExamAnswers asked 3 years ago • CCNA CyberOps, CCNA Security, Cyber Threat ManagementWhat are two tasks that can be accomplished with the Nmap and Zenmap network tools? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat network scanning tool has advanced features that allows it to use decoy hosts to mask the source of the scan?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementWhich network security tool can detect open TCP and UDP ports on most versions of Microsoft Windows?ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementHow does network scanning help assess operations security?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Cyber Threat ManagementMatch the network security testing tool with the correct function. (Not all options are used.)ITExamAnswers asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat is the result in the self zone if a router is the source or destination of traffic?ITExamAnswers asked 4 years ago • CCNP, CCNA Security, Network DefenseRefer to the exhibit. Which statement describes the function of the ACEs?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2, Network DefenseWhat is the purpose of the DH algorithm?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network Defense