IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhich security measure is typically found both inside and outside a data center facility?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint Security, Network DefenseWhat are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Cybersecurity EssentialsWhat is a difference between symmetric and asymmetric encryption algorithms?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Cybersecurity EssentialsWhat command will prevent all unencrypted passwords from displaying in plain text in a configuration file?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, Networking EssentialsWhen is UDP preferred to TCP?ITExamAnswers asked 4 years ago • CCNA Security, Networking Basics, Networking EssentialsWhich two steps are required before SSH can be enabled on a Cisco router? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNP, Networking EssentialsWhat is one difference between using Telnet or SSH to connect to a network device for management purposes?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v6, CCNA 2 v7, CCNA Security, Networking Devices and Initial Configuration, Networking EssentialsWhich type of firewall is the most common and allows or blocks traffic based on Layer 3, Layer 4, and Layer 5 information?IT Administrator asked 3 years ago • CCNA SecurityWhat represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?ITExamAnswers asked 4 years ago • CCNA 4 v6, CCNA SecurityWhat network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?ITExamAnswers asked 4 years ago • CCNA 4 v6, CCNA SecurityWhat protocol should be disabled to help mitigate VLAN hopping attacks?ITExamAnswers asked 3 years ago • CCNA 4 v6, CCNA SecurityWhich security feature should be enabled in order to prevent an attacker from overflowing the MAC address table of a switch?ITExamAnswers asked 3 years ago • CCNA, CCNA 4 v6, CCNA SecurityWhen SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?ITExamAnswers asked 3 years ago • CCNA, CCNA 4 v6, CCNA SecurityWhich statement describes SNMP operation?ITExamAnswers asked 4 years ago • CCNA 3 v7, CCNA 4 v6, CCNA SecurityWhich feature is unique to IPv6 ACLs when compared to those of IPv4 ACLs?ITExamAnswers asked 4 years ago • CCNA, CCNA 4 v6, CCNA Security, CCNP