IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhat is the benefit of the network-based IPS (NIPS) over host-based IPS (HIPS) deployment models?ITExamAnswers asked 3 years ago • CCNA SecurityWhat is required for auto detection and negotiation of NAT when establishing a VPN link?ITExamAnswers asked 3 years ago • CCNA SecurityThe corporate security policy dictates that the traffic from the remote-access VPN clients must be separated between trusted traffic that is destined for the corporate subnets and untrusted traffic destined for the public Internet. Which VPN solution should be implemented to ensure compliance with the corporate policy?ITExamAnswers asked 3 years ago • CCNA SecurityA company deploys a Cisco ASA with the Cisco CWS connector enabled as the firewall on the border of corporate network. An employee on the internal network is accessing a public website. What should the employee do in order to make sure the web traffic is protected by the Cisco CWS?ITExamAnswers asked 3 years ago • CCNA SecurityWhich two protocols can be selected using the Cisco AnyConnect VPN Wizard to protect the traffic inside a VPN tunnel? (Choose two.)ITExamAnswers asked 3 years ago • CCNA SecurityRefer to the exhibit. If a network administrator is using ASDM to configure a site-to-site VPN between the CCNAS-ASA and R3, which IP address would the administrator use for the peer IP address textbox on the ASA if data traffic is to be encrypted between the two remote LANs?ITExamAnswers asked 3 years ago • CCNA SecurityWhich interface option could be set through ASDM for a Cisco ASA?ITExamAnswers asked 3 years ago • CCNA SecurityWhich two conditions must be met in order for a network administrator to be able to remotely manage multiple ASAs with Cisco ASDM? (Choose two.)ITExamAnswers asked 3 years ago • CCNA SecurityWhich type of traffic is subject to filtering on an ASA 5505 device?ITExamAnswers asked 3 years ago • CCNA SecurityWhat mechanism is used by an ASA 5505 device to allow inspected outbound traffic to return to the originating sender who is on an inside network?ITExamAnswers asked 3 years ago • CCNA SecurityWhy is hashing cryptographically stronger compared to a cyclical redundancy check (CRC)?ITExamAnswers asked 3 years ago • CCNA SecurityOn which port should Dynamic ARP Inspection (DAI) be configured on a switch?IT Administrator asked 4 years ago • CCNA, CCNA SecurityWhich Cisco IOS subcommand is used to compile an IPS signature into memory?ITExamAnswers asked 3 years ago • CCNA SecurityAn organization has configured an IPS solution to use atomic alerts. What type of response will occur when a signature is detected?ITExamAnswers asked 3 years ago • CCNA SecurityWhat is a benefit of using a next-generation firewall rather than a stateful firewall?ITExamAnswers asked 3 years ago • CCNA Security