IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhich three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v6, CCNA 4 v6, CCNA SecurityA network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v6, CCNA 4 v6, CCNA SecurityWhich two characteristics are shared by both standard and extended ACLs? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA 4 v6, CCNA Security, CCNPWhich three statements describe ACL processing of packets? (Choose three.)ITExamAnswers asked 4 years ago • CCNP, CCNA, CCNA 2 v6, CCNA 4 v4, CCNA 4 v6, CCNA SecurityWhich statement describes a feature of site-to-site VPNs?IT Administrator asked 4 years ago • CCNA, CCNA 4 v6, CCNA SecurityWhich two protocols generate connection information within a state table and are supported for stateful filtering? (Choose two.)IT Administrator asked 3 years ago • CCNA Security, Network Security 1.0Which statement accurately describes dynamic NAT?IT Administrator asked 3 years ago • CCNA, CCNA 2 v6, CCNA Security, DevNet, Networking EssentialsA destination route in the routing table is indicated with a code D. Which kind of route entry is this?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v6, CCNA SecurityAs data is being stored on a local hard disk, which method would secure the data from unauthorized access?IT Administrator asked 3 years ago • CCNA Security, Introduction to Cybersecurity, IT Essentials, IT Essentials 8A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?ITExamAnswers asked 4 years ago • CCNA Security, IT Essentials 8Which is a requirement of a site-to-site VPN?ITExamAnswers asked 4 years ago • CCNA, CCNA 3 v7, CCNA SecurityWhat is a ping sweep?ITExamAnswers asked 4 years ago • CCNA 3 v7, CCNA Security, CCNA Security v1.2What function is provided by Snort as part of the Security Onion?IT Administrator asked 3 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat two assurances does digital signing provide about code that is downloaded from the Internet? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat technology allows users to verify the identity of a website and to trust code that is downloaded from the Internet?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network Defense