IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityRefer to the exhibit. According to the command output, which three statements are true about the DHCP options entered on the ASA? (Choose three.)IT Administrator asked 3 years ago • CCNA SecurityWhich method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?IT Administrator asked 3 years ago • CCNA SecurityA client connects to a Web server. Which component of this HTTP connection is not examined by a stateful firewall?IT Administrator asked 3 years ago • CCNA SecurityWhich network monitoring technology uses VLANs to monitor traffic on remote switches?IT Administrator asked 3 years ago • CCNA SecurityWhich rule action will cause Snort IPS to block and log a packet?IT Administrator asked 3 years ago • CCNA SecurityWhat is typically used to create a security trap in the data center facility?IT Administrator asked 3 years ago • CCNA SecurityA company is concerned with leaked and stolen corporate data on hard copies. Which data loss mitigation technique could help with this situation?IT Administrator asked 3 years ago • CCNA SecurityWhat command is used on a switch to set the port access entity type so the interface acts only as an authenticator and will not respond to any messages meant for a supplicant?IT Administrator asked 3 years ago • CCNA SecurityWhen the CLI is used to configure an ISR for a site-to-site VPN connection, which two items must be specified to enable a crypto map policy? (Choose two.)ITExamAnswers asked 3 years ago • CCNA SecurityWhat are two examples of DoS attacks? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, CCNA SecurityWhat security countermeasure is effective for preventing CAM table overflow attacks?ITExamAnswers asked 3 years ago • CCNA SecurityRefer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityWhat is a characteristic of a DMZ zone?ITExamAnswers asked 3 years ago • CCNA SecurityIn an AAA-enabled network, a user issues the configure terminal command from the privileged executive mode of operation. What AAA function is at work if this command is rejected?ITExamAnswers asked 3 years ago • CCNA SecurityWhich two statements describe the characteristics of symmetric algorithms? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security