IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityIf the provided ACEs are in the same ACL, which ACE should be listed first in the ACL according to best practice?ITExamAnswers asked 3 years ago • CCNA, CCNA SecurityA network administrator configures an ACL with the command R1(config)# access-list 1 permit 172.16.0.0 0.0.15.255. Which two IP addresses will match this ACL statement? (Choose two.)ITExamAnswers asked 4 years ago • CCNP, CCNA, CCNA SecurityWhat is the role of an IPS?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA SecurityWhat port state is used by 802.1X if a workstation fails authorization?IT Administrator asked 3 years ago • CCNA SecurityMatch the ASA special hardware modules to the description.IT Administrator asked 3 years ago • CCNA SecurityRefer to the exhibit. Which two ACLs, if applied to the G0/1 interface of R2, would permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface? (Choose two.)ITExamAnswers asked 4 years ago • CCNP, CCNA SecurityWhat will be the result of failed login attempts if the following command is entered into a router?ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityWhich portion of the Snort IPS rule header identifies the destination port?IT Administrator asked 3 years ago • CCNA SecurityWhat are two differences between stateful and packet filtering firewalls? (Choose two.)IT Administrator asked 3 years ago • CCNA SecurityWhat are the three components of an STP bridge ID? (Choose three.)IT Administrator asked 3 years ago • CCNA SecurityWhat tool is available through the Cisco IOS CLI to initiate security audits and to make recommended configuration changes with or without administrator input?IT Administrator asked 3 years ago • CCNA SecurityWhich two statements describe the use of asymmetric algorithms? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich protocol or measure should be used to mitigate the vulnerability of using FTP to transfer documents between a teleworker and the company file server?ITExamAnswers asked 3 years ago • CCNA Security, CCNPRefer to the exhibit. What algorithm is being used to provide public key exchange?ITExamAnswers asked 4 years ago • CCNP, CCNA SecurityWhat function is performed by the class maps configuration object in the Cisco modular policy framework?ITExamAnswers asked 3 years ago • CCNA Security