IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhich two statements describe the effect of the access control list wildcard mask 0.0.0.15? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNP, Network DefenseWhen a Cisco IOS zone-based policy firewall is being configured, which three actions can be applied to a traffic class? (Choose three.)IT Administrator asked 3 years ago • CCNA Security, Network DefenseWhat is one limitation of a stateful firewall?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhat technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseIn which way does the use of HTTPS increase the security monitoring challenges within enterprise networks?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat is one benefit of using a next-generation firewall rather than a stateful firewall?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich technique is necessary to ensure a private transfer of data using a VPN?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, CCNA Security, Network DefenseMatch the security concept to the description.IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat wild card mask will match networks 172.16.0.0 through 172.19.0.0?IT Administrator asked 4 years ago • CCNA Security, Network DefenseA company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Network DefenseWhich operator is used in an ACL statement to match packets of a specific application?ITExamAnswers asked 3 years ago • CCNA, CCNA Security, Network DefenseA company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Network DefenseAn IT enterprise is recommending the use of PKI applications to securely exchange information between the employees. In which two cases might an organization use PKI applications to securely exchange information between users? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich type of firewall is commonly part of a router firewall and allows or blocks traffic based on Layer 3 and Layer 4 information?IT Administrator asked 3 years ago • CCNA Security, Network DefenseWhat is the purpose of mobile device management (MDM) software?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network Defense