IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNPIn terms of design, which layer of the hierarchical model is the most complex?ITExamAnswers asked 3 years ago • CCNPWhat feature of CEF allows for Layer 3 switches to use multiple paths?ITExamAnswers asked 3 years ago • CCNPWhat plane on a network device is accessed using SSH or SNMP?ITExamAnswers asked 3 years ago • CCNPWhich protocol or measure should be used to mitigate the vulnerability of using FTP to transfer documents between a teleworker and the company file server?ITExamAnswers asked 3 years ago • CCNA Security, CCNPRefer to the exhibit. What algorithm is being used to provide public key exchange?ITExamAnswers asked 3 years ago • CCNP, CCNA SecurityWhat role does Cisco Umbrella play in the Cisco SAFE framework?IT Administrator asked 3 years ago • CCNPWhen comparing two absolute power values, what can a wireless engineer conclude after calculating a result of 10 dB?IT Administrator asked 3 years ago • CCNPCisco has created a security framework to help protect networks from ever-evolving cybersecurity threats. What is the term given to an elite team of security experts who track evolving threats across all parts of networks, cloud environments, and the web to provide a comprehensive understanding and solution for protection against these cyber threats?IT Administrator asked 3 years ago • CCNPA company uses APs to create multiple wireless networks. In one particular area users complain that there is no wireless connectivity. When the network engineer uses the WLC GUI to verify connectivity to the APs, one of the APs does not appear in the list. What should the engineer check first?IT Administrator asked 3 years ago • CCNPCisco has created a security framework to help protect networks from ever-evolving cybersecurity threats. What is the term given to a tool that searches for potential network intrusion attacks by monitoring, analysis, and logging of network traffic and also provides advanced threat protection and remediation?IT Administrator asked 3 years ago • CCNPRefer to the exhibit. A network administrator is configuring MST tuning on SW1. The objective is to change the priority value of the interface Gi1/0/5 so that the interface is preferred when determining the root ports. Which value could be used in the spanning-tree mst 0 port-priority command to achieve this objective?IT Administrator asked 3 years ago • CCNPMatch the Cisco SD-WAN solution component with the description. (Not all options are used.)ITExamAnswers asked 3 years ago • CCNPWhich two OSPFv3 LSA types are used to advertise IPv6 prefixes to neighbors? (Choose two.)IT Administrator asked 3 years ago • CCNPA network operator is testing a network management application that uses REST API to communicate with network devices. The operator received an HTTP response code 403 in a test step. What does this response code indicate?ITExamAnswers asked 3 years ago • CCNP, DevNetFrom the routing tables shown from routers within a multiarea OSPF network, which routing table would be from an internal router that is within a totally stub area?IT Administrator asked 3 years ago • CCNP