IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityRefer to the exhibit. What algorithm will be used for providing confidentiality?ITExamAnswers asked 3 years ago • CCNA SecurityMatch each SNMP operation to the corresponding description. (Not all options are used.)IT Administrator asked 3 years ago • CCNA SecurityRefer to the exhibit. The administrator wants to enable port security on an interface on switch S1, but the command was rejected. Which conclusion can be drawn?IT Administrator asked 4 years ago • CCNA, CCNA SecurityAlice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?IT Administrator asked 3 years ago • CCNA Security, Cybersecurity EssentialsWhat is the standard for a public key infrastructure to manage digital certificates?IT Administrator asked 3 years ago • CCNA Security, Cybersecurity EssentialsWhich attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, IoT SecurityMatch the IPS alarm type to the description.IT Administrator asked 3 years ago • CCNA SecurityUpon completion of a network security course, a student decides to pursue a career in cryptanalysis. What job would the student be doing as a cryptanalyst?IT Administrator asked 3 years ago • CCNA SecurityThe security policy in a company specifies that employee workstations can initiate HTTP and HTTPS connections to outside websites and the return traffic is allowed. However, connections initiated from outside hosts are not allowed. Which parameter can be used in extended ACLs to meet this requirement?IT Administrator asked 3 years ago • CCNA SecurityWhich service should be disabled on a router to prevent a malicious host from falsely responding to ARP requests with the intent to redirect the Ethernet frames?ITExamAnswers asked 3 years ago • CCNA Security, CCNPA network administrator is configuring DAI on a switch. Which command should be used on the uplink interface that connects to a router?IT Administrator asked 3 years ago • CCNA, CCNA SecurityWhat Layer 2 attack is mitigated by disabling Dynamic Trunking Protocol?ITExamAnswers asked 3 years ago • CCNA, CCNA SecurityA network administrator is configuring DAI on a switch with the command ip arp inspection validate dst-mac . What is the purpose of this configuration command?IT Administrator asked 3 years ago • CCNA, CCNA SecurityWhich procedure is recommended to mitigate the chances of ARP spoofing?ITExamAnswers asked 3 years ago • CCNA, CCNA SecurityWhich command would be best to use on an unused switch port if a company adheres to the best practices as recommended by Cisco?ITExamAnswers asked 4 years ago • CCNA, CCNA Security