IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityAn administrator is trying to develop a BYOD security policy for employees that are bringing a wide range of devices to connect to the company network. Which three objectives must the BYOD security policy address? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityA technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityWhich three services are provided through digital signatures? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityWhich three functions are provided by the syslog logging service? (Choose three.)IT Administrator asked 3 years ago • CCNA Security, CCNPWhat are two reasons to enable OSPF routing protocol authentication on a network? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityRefer to the exhibit. Which conclusion can be made from the show crypto map command output that is shown on R1?ITExamAnswers asked 3 years ago • CCNA SecurityWhat are two drawbacks in assigning user privilege levels on a Cisco router? (Choose two.)ITExamAnswers asked 3 years ago • CCNA SecurityA user complains about being locked out of a device after too many unsuccessful AAA login attempts. What could be used by the network administrator to provide a secure authentication access method without locking a user out of a device?ITExamAnswers asked 3 years ago • CCNA SecurityWhat ports can receive forwarded traffic from an isolated port that is part of a PVLAN?ITExamAnswers asked 3 years ago • CCNA SecurityWhat are two disadvantages of using an IDS? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityRefer to the exhibit. A network administrator configures a named ACL on the router. Why is there no output displayed when the show command is issued?IT Administrator asked 3 years ago • CCNA SecurityWhat two features are added in SNMPv3 to address the weaknesses of previous versions of SNMP? (Choose two.)IT Administrator asked 3 years ago • CCNA SecurityWhich type of firewall makes use of a server to connect to destination devices on behalf of clients?IT Administrator asked 3 years ago • CCNA SecurityRefer to the exhibit. What will be displayed in the output of the show running-config object command after the exhibited configuration commands are entered on an ASA 5506-X?IT Administrator asked 3 years ago • CCNA Security