IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhich are the five security associations to configure in ISAKMP policy configuration mode?ITExamAnswers asked 3 years ago • CCNA SecurityWhat is defined by an ISAKMP policy?ITExamAnswers asked 3 years ago • CCNA SecurityWhat is the purpose of IKE?ITExamAnswers asked 3 years ago • CCNA SecurityWhich IPsec security function provides assurance that the data received via a VPN has not been modified in transit?ITExamAnswers asked 4 years ago • CCNA SecurityWhich two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityWhat are the two types of VPN connections? (Choose two.)ITExamAnswers asked 4 years ago • CCNA SecurityA network administrator is planning a VPN tunnel. Why would the engineer select main mode for IKE Phase 1?ITExamAnswers asked 3 years ago • CCNA SecurityWhat is a purpose of a digital certificate?ITExamAnswers asked 3 years ago • CCNA SecurityWhich CA class of digital certificates would be used by individuals to perform email verification?ITExamAnswers asked 3 years ago • CCNA SecurityWhich technology is used to provide assurance of the authenticity and integrity of software code?ITExamAnswers asked 3 years ago • CCNA SecurityWhat protocol is used to query the revocation status of an X.509 certificate?ITExamAnswers asked 3 years ago • CCNA SecurityWhat is the function of the Diffie-Hellman algorithm within the IPsec framework?ITExamAnswers asked 4 years ago • CCNP, CCNA SecurityWhich two algorithms use a hashing function to ensure message integrity? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhich data security component is provided by hashing algorithms?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is the reason for HMAC to use an additional secret key as input to the hash function?ITExamAnswers asked 3 years ago • CCNA Security