IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhich statement describes the use of certificate classes in the PKI?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich two statements correctly describe certificate classes used in the PKI? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Network DefenseWhich statement is a feature of HMAC?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhen configuring a class map for a zone-based policy firewall, how is the match criteria applied when using the match-all parameter?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseIn what step of zone-based policy firewall configuration is traffic identified for policy application?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhen a Cisco IOS Zone-Based Policy Firewall is being configured, which two actions can be applied to a traffic class? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich statement accurately describes Cisco IOS Zone-Based Policy Firewall operation?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2, Network DefenseWhich statement describes a factor to be considered when configuring a zone-based policy firewall?ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2, Network DefenseHow does ZPF handle traffic between an interface that is a zone member and another interface that does not belong to any zone?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseIn ZPF design, what is described as the self zone?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich three statements describe zone-based policy firewall rules that govern interface behavior and the traffic moving between zone member interfaces? (Choose three.)ITExamAnswers asked 3 years ago • CCNA Security, CCNA Security v1.2, Network DefenseWhich statement describes one of the rules that govern interface behavior in the context of implementing a zone-based policy firewall configuration?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Endpoint Security, Network DefenseDesigning a ZPF requires several steps. Which step involves defining boundaries where traffic is subjected to policy restrictions as it crosses to another region of the network?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich statement describes a zone when implementing ZPF on a Cisco router?ITExamAnswers asked 3 years ago • CCNA Security, Network Defense