IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityThe switch port to which a client attaches is configured for the 802.1X protocol. The client must authenticate before being allowed to pass data onto the network. Between which two 802.1X roles is EAP data encapsulated using RADIUS? (Choose two.)ITExamAnswers asked 3 years ago • CCNA SecurityWhich command is used to enable AAA as part of the 802.1X configuration process on a Cisco device?ITExamAnswers asked 3 years ago • CCNA SecurityWhat are two main capabilities of a NAC system? (Choose two.)ITExamAnswers asked 3 years ago • CCNA SecurityWhich device is used as the authentication server in an 802.1X implementation?ITExamAnswers asked 3 years ago • CCNA SecurityA switch has the following command issued as part of an 802.1X deployment. address ipv4 10.1.1.50 auth-port 1812 acct-port 1813 What is the purpose of this command?ITExamAnswers asked 3 years ago • CCNA SecurityWhat is the source for IPS rule updates when using a Cisco intrusion prevention service?ITExamAnswers asked 3 years ago • CCNA SecurityWhich rule action will cause Snort IPS to block a packet without logging it?ITExamAnswers asked 3 years ago • CCNA SecurityWhich device is a dedicated inline threat prevention appliance that is effective against both known and unknown threats?ITExamAnswers asked 3 years ago • CCNA SecurityWhat are three actions that can be performed by Snort in IDS mode? (Choose three.)ITExamAnswers asked 3 years ago • CCNA SecurityWhich statement correctly describes the configuration of a Snort VPG interface?ITExamAnswers asked 3 years ago • CCNA SecurityWhich intrusion prevention service was available on first-generation ISR routers and is no longer supported by Cisco?ITExamAnswers asked 3 years ago • CCNA SecurityWhat is a characteristic of the Snort subscriber rule set term-based subscription?ITExamAnswers asked 3 years ago • CCNA SecurityWhich type of alert is generated when an IPS incorrectly identifies normal network user traffic as attack traffic?ITExamAnswers asked 3 years ago • CCNA SecurityWhat term describes a set of rules used by an IDS or IPS to detect typical intrusion activity?ITExamAnswers asked 3 years ago • CCNA SecurityWhich IPS signature trigger category uses the simplest triggering mechanism and searches for a specific and pre-defined atomic or composite pattern?ITExamAnswers asked 3 years ago • CCNA Security