IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityOne method used by Cryptanalysts to crack codes is based on the fact that some letters of the English language are used more often than others. Which term is used to describe this method?IT Administrator asked 3 years ago • CCNA SecurityWhich cipher played a significant role in World War II?IT Administrator asked 3 years ago • CCNA SecurityDuring a recent pandemic, employees from ABC company were allowed to work from home. What security technology should be implemented to ensure that data communications between the employees and the ABC Head Office network remain confidential?IT Administrator asked 3 years ago • CCNA SecurityRefer to the exhibit. A network administrator is configuring DAI on switch SW1. What is the result of entering the exhibited commands?Richard Betz commented 3 years ago • CCNA, CCNA SecurityWhat are three techniques for mitigating VLAN hopping attacks? (Choose three.)ITExamAnswers asked 3 years ago • CCNA SecurityA company requires the use of 802.1X security. What type of traffic can be sent if the authentication port-control auto command is configured, but the client has not yet been authenticated?IT Administrator asked 3 years ago • CCNA SecurityWhat protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNPA company is concerned about data theft if any of the corporate laptops are stolen. Which Windows tool would the company use to protect the data on the laptops?IT Administrator asked 3 years ago • CCNA SecurityWhat is the IPS detection engine that is included in the SEC license for 4000 Series ISRs?IT Administrator asked 3 years ago • CCNA SecurityWhat is a characteristic of an IPS atomic signature?IT Administrator asked 3 years ago • CCNA SecurityWhat are two monitoring tools that capture network traffic and forward it to network monitoring devices? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityMatch the network security device type with the description.IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat additional security measure must be enabled along with IP Source Guard to protect against address spoofing?ITExamAnswers asked 3 years ago • CCNA SecurityWhat is the only type of port that an isolated port can forward traffic to on a private VLAN?ITExamAnswers asked 3 years ago • CCNA SecurityWhich two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)ITExamAnswers asked 4 years ago • CCNA Security