IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhat are two methods to maintain certificate revocation status? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseA company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. This code is changed every day. Which two algorithms can be used to achieve this task? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseDesigning a ZPF requires several steps. Which step involves dictating the number of devices between most-secure and least-secure zones and determining redundant devices?IT Administrator asked 3 years ago • CCNA Security, Network DefenseWhich type of firewall makes use of a proxy server to connect to remote servers on behalf of clients?IT Administrator asked 3 years ago • CCNA Security, Network DefenseWhat are two differences between stateful and stateless firewalls? (Choose two.)IT Administrator asked 3 years ago • CCNA Security, Network DefenseWhich classification indicates that an alert is verified as an actual security incident?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich Cisco appliance can be used to filter network traffic contents to report and deny traffic based on the web server reputation?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich measure can a security analyst take to perform effective security monitoring against network traffic encrypted by SSL technology?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat are two benefits of using a ZPF rather than a Classic Firewall? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich two statements describe the two configuration models for Cisco IOS firewalls? (Choose two.)IT Administrator asked 3 years ago • CCNA Security, Network DefenseHow does a firewall handle traffic when it is originating from the private network and traveling to the DMZ network?IT Administrator asked 3 years ago • CCNA Security, Network DefenseHow does a firewall handle traffic when it is originating from the public network and traveling to the DMZ network?IT Administrator asked 3 years ago • CCNA Security, Network DefenseWhat are two characteristics of a stateful firewall? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseRefer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets from the ISP will be dropped by the ACL on R1?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, Network DefenseRefer to the exhibit. What is the result of adding the established argument to the end of the ACE?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, Network Defense