IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhen an inbound Internet-traffic ACL is being implemented, what should be included to prevent the spoofing of internal networks?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseA network administrator is configuring an AAA server to manage RADIUS authentication. Which two features are included in RADIUS authentication? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich two options are security best practices that help mitigate BYOD risks? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat three configuration steps must be performed to implement SSH access to a router? (Choose three.)ITExamAnswers asked 4 years ago • CCNA Security, Networking Devices and Initial ConfigurationA network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, Networking Devices and Initial Configuration, Networking EssentialsWhat type of network security test uses simulated attacks to determine the feasibility of an attack as well as the possible consequences if the attack occurs?IT Administrator asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat type of network security test can detect and report changes made to network systems?IT Administrator asked 3 years ago • CCNA Security, Cyber Threat ManagementWhat are two shared characteristics of the IDS and the IPS? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhich two types of hackers are typically classified as grey hat hackers? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, CCNA Security, Endpoint SecurityWhat are three functions provided by the syslog service? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityWhat are three access control security services? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Cybersecurity Essentials, Endpoint SecurityWhich security measure is best used to limit the success of a reconnaissance attack from within a campus area network?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint SecurityWhich risk management plan involves discontinuing an activity that creates a risk?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityA researcher is comparing the differences between a stateless firewall and a proxy firewall. Which two additional layers of the OSI model are inspected by a proxy firewall? (Choose two.)IT Administrator asked 3 years ago • CCNA SecurityRefer to the exhibit. The ip verify source command is applied on untrusted interfaces. Which type of attack is mitigated by using this configuration?ITExamAnswers asked 3 years ago • CCNA Security