IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhat are two characteristics of both IPS and IDS sensors? (Choose two.)IT Administrator asked 3 years ago • CCNA SecurityWhich statement describes the function of the SPAN tool used in a Cisco switch?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is a network tap?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA SecurityWhat is the first step in configuring a Cisco IOS zone-based policy firewall via the CLI?IT Administrator asked 3 years ago • CCNA SecurityHow does a firewall handle traffic when it is originating from the public network and traveling to the private network?IT Administrator asked 3 years ago • CCNA SecurityWhat are two possible limitations of using a firewall in a network? (Choose two.)IT Administrator asked 3 years ago • CCNA SecurityWhat two statements describe characteristics of IPv6 access control lists? (Choose two.)IT Administrator asked 3 years ago • CCNA SecurityWhich two types of addresses should be denied inbound on a router interface that attaches to the Internet? (Choose two.)IT Administrator asked 3 years ago • CCNA SecurityWhat two steps provide the quickest way to completely remove an ACL from a router? (Choose two.)IT Administrator asked 3 years ago • CCNA SecurityWhich two pieces of information are required when creating a standard access control list? (Choose two.)ITExamAnswers asked 4 years ago • CCNA SecurityWhen creating an ACL, which keyword should be used to document and interpret the purpose of the ACL statement on a Cisco device?IT Administrator asked 3 years ago • CCNA SecurityRefer to the exhibit. A network administrator created an IPv6 ACL to block the Telnet traffic from the 2001:DB8:CAFE:10::/64 network to the 2001:DB8:CAFE:30::/64 network. What is a command the administrator could use to allow only a single host 2001:DB8:CAFE:10::A/64 to telnet to the 2001:DB8:CAFE:30::/64 network?ITExamAnswers asked 3 years ago • CCNA Security, CCNPWhat is one benefit of using a stateful firewall instead of a proxy server?ITExamAnswers asked 3 years ago • CCNA SecurityWhich task is necessary to encrypt the transfer of data between the ACS server and the AAA-enabled router?IT Administrator asked 3 years ago • CCNA SecurityRefer to the exhibit. What information in the syslog message identifies the facility?IT Administrator asked 3 years ago • CCNA Security