IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNPWhich two commands can be used to verify the content and placement of access control lists? (Choose two.)ITExamAnswers asked 4 years ago • CCNPRefer to the exhibit. A network administrator is configuring an ACL to limit the connection to R1 vty lines to only the IT group workstations in the network 192.168.22.0/28. The administrator verifies the successful Telnet connections from a workstation with IP 192.168.22.5 to R1 before the ACL is applied. However, after the ACL is applied to the interface Fa0/0, Telnet connections are denied. What is the cause of the connection failure?ITExamAnswers asked 4 years ago • CCNPRefer to the exhibit. An administrator is configuring a prefix list to stop advertising 172.18.100.0/24, a secure Branch network, to the internet. After adding the prefix list, the administrator notices that the branch network is still being advertised. How can the administrator fix the error?ITExamAnswers asked 3 years ago • CCNPA network administrator is configuring an IPv6 ACL to deny Telnet access from all staff in the branch office to a file server in home office. All branch office staff use addressing from the IPv6 subnet 2001:DB8:100:20::/64. The file server in home office uses the address 2001:DB8:100:50::15/64. Implementing the No-Telnet ACL on the LAN interface of the branch office router requires which three commands? (Choose three.)ITExamAnswers asked 3 years ago • CCNPWhich algorithm is used to support ESP encryption?ITExamAnswers asked 3 years ago • CCNPWhat can be configured with DMVPN tunnels to provide confidentiality and integrity to data transported over the Internet?ITExamAnswers asked 3 years ago • CCNPWhat is a characteristic of the DMVPN IPsec tunnel mode?ITExamAnswers asked 3 years ago • CCNPWhat are two characteristics of IPsec ESP tunnel mode? (Choose two.)ITExamAnswers asked 3 years ago • CCNPWhat is a characteristic of the IPsec Encapsulation Security Payload protocol?ITExamAnswers asked 3 years ago • CCNPWhat protection is provided by IPsec perfect forward secrecy?ITExamAnswers asked 3 years ago • CCNPWhich security mechanism is used to ensure data integrity?ITExamAnswers asked 3 years ago • CCNPWhat element of security is ensured by data confidentiality?ITExamAnswers asked 3 years ago • CCNPWhich component is an element of secure data transport that is concerned with ensuring data is viewable to only authorized users?ITExamAnswers asked 3 years ago • CCNPWhat is the default NHRP cache holdtime period?ITExamAnswers asked 3 years ago • CCNPRefer to the exhibit. A network administrator has configured a GRE tunnel between routers CE1 and CE2 to connect two corporate sites across the provider network. From the perspective of router CE1, how many hops away is network 10.0.0.0/24?ITExamAnswers asked 3 years ago • CCNP