IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhat are two benefits offered by a zone-based policy firewall on a Cisco router? (Choose two.)IT Administrator asked 3 years ago • CCNA Security, Network DefenseWhich term describes the ability of a web server to keep a log of the users who access the server, as well as the length of time they use it?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat is the purpose of a digital certificate?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhen implementing a ZPF, what is the default security setting when forwarding traffic between two interfaces in the same zone?IT Administrator asked 3 years ago • CCNA Security, Network DefenseWhat is the function of the pass action on a Cisco IOS Zone-Based Policy Firewall?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA 3 v7, CCNA Security, CCNP, Network DefenseMatch the security policy with the description. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich ICMP message type should be stopped inbound?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhen implementing components into an enterprise network, what is the purpose of a firewall?IT Administrator asked 3 years ago • CCNA Security, Network DefenseTo facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?ITExamAnswers asked 3 years ago • CCNA, CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich command is used to activate an IPv6 ACL named ENG_ACL on an interface so that the router filters traffic prior to accessing the routing table?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v5, CCNA Security, CCNA Security v1.2, CCNP, Network DefenseIn the creation of an IPv6 ACL, what is the purpose of the implicit final command entries, permit icmp any any nd-na and permit icmp any any nd-ns ?IT Administrator asked 3 years ago • CCNA 2 v5, CCNA SecurityIn applying an ACL to a router interface, which traffic is designated as outbound?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v5, CCNA Security, Network DefenseWhat is an example of a local exploit?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint SecurityIn an attempt to prevent network attacks, cyber analysts share unique identifiable attributes of known attacks with colleagues. What three types of attributes or indicators of compromise are helpful to share? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint Security