IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhat single access list statement matches all of the following networks?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, Network DefenseIn a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseRefer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNA Security v1.2ACLs are used primarily to filter traffic. What are two additional uses of ACLs? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v5, CCNA Discovery v4, CCNA Security, CCNPA server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?IT Administrator asked 3 years ago • CCNA CyberOps, CCNA Discovery v4, CCNA SecurityWhich two statements describe static routes? (Choose two.)IT Administrator asked 3 years ago • CCNA 2 v5, CCNA Discovery v4, CCNA SecurityPasswords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v4, CCNA Discovery v4, CCNA Security, Networking Devices and Initial Configuration, Networking EssentialsWhich three security services are provided by digital signatures? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseRefer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNP, Networking Basics, Networking Devices and Initial Configuration, Networking EssentialsSwitch port Fa0/24 was previously configured as a trunk, but now it is to be used to connect a host to the network. How should the network administrator reconfigure switch port Fa0/24?IT Administrator asked 3 years ago • CCNA Discovery v4, CCNA SecurityWhen configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNP, Networking Devices and Initial Configuration, Networking EssentialsWhich type of access is secured on a Cisco router or switch with the enable secret command?ITExamAnswers asked 4 years ago • CCNA Security, Networking Devices and Initial Configuration, Networking EssentialsA network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?ITExamAnswers asked 4 years ago • CCNA Security, Networking Devices and Initial Configuration, Networking EssentialsWhich two characteristics describe a worm? (Choose two.)ITExamAnswers asked 4 years ago • IT Essentials, CCNA Security, Introduction to CybersecurityPlace the steps for configuring zone-based policy (ZPF) firewalls in order from first to last. (Not all options are used.)IT Administrator asked 3 years ago • CCNA Security, Network Defense