IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityOn what switch ports should PortFast be enabled to enhance STP stability?ITExamAnswers asked 4 years ago • CCNP, CCNA, CCNA SecurityWhat mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityWhat is the purpose of AAA accounting?ITExamAnswers asked 4 years ago • CCNP, CCNA, CCNA SecurityWhich Cisco solution helps prevent MAC and IP address spoofing attacks?IT Administrator asked 3 years ago • CCNA, CCNA SecurityIn a server-based AAA implementation, which protocol will allow the router to successfully communicate with the AAA server?ITExamAnswers asked 3 years ago • CCNA, CCNA SecurityWhy is authentication with AAA preferred over a local database method?ITExamAnswers asked 3 years ago • CCNA, CCNA SecurityWhat technology supports asymmetric key encryption used in IPsec VPNs?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat role does an RA play in PKI?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is the purpose of code signing?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat are two symmetric encryption algorithms? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich protocol is an IETF standard that defines the PKI digital certificate format?IT Administrator asked 3 years ago • CCNA CyberOps, CCNA SecurityWhich algorithm can ensure data confidentiality?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA SecurityWhat threat intelligence group provides blogs and podcasts to help network security professionals remain effective and up-to-date?ITExamAnswers asked 3 years ago • CCNA CyberOps, CCNA SecurityWhich two protocols are used to provide server-based AAA authentication? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA SecurityWhich objective of secure communications is achieved by encrypting data?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security