IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhich two statements describe the IPsec protocol framework? (Choose two.)IT Administrator asked 3 years ago • CCNA SecurityRefer to the exhibit. What HMAC algorithm is being used to provide data integrity?ITExamAnswers asked 3 years ago • CCNA SecurityWhat is a function of the GRE protocol?ITExamAnswers asked 4 years ago • CCNP, CCNA SecurityWhat is needed to define interesting traffic in the creation of an IPsec tunnel?ITExamAnswers asked 3 years ago • CCNA SecurityConsider the following configuration on a Cisco ASA: crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac What is the purpose of this command?ITExamAnswers asked 3 years ago • CCNA SecurityWhich statement accurately describes a characteristic of IPsec?ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityWhich two scenarios are examples of remote access VPNs? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityHow is “tunneling” accomplished in a VPN?ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityWhich protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNPWhat is the Control Plane Policing (CoPP) feature designed to accomplish?ITExamAnswers asked 4 years ago • CCNP, CCNA SecurityMatch the disciplines or roles to the descriptions.IT Administrator asked 3 years ago • CCNA SecurityIn which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding ciphertext?IT Administrator asked 3 years ago • CCNA SecurityWhat popular encryption algorithm requires that both the sender and receiver know a pre-shared key?IT Administrator asked 3 years ago • CCNA SecurityWhat is the keyspace of an encryption algorithm?IT Administrator asked 3 years ago • CCNA SecurityThe following message was encrypted using a Caesar cipher with a key of 2: fghgpf vjg ecuvng What is the plaintext message?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security