IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network DefenseWhich two statements correctly describe certificate classes used in the PKI? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Network DefenseWhich statement is a feature of HMAC?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhat term is used to refer to readable data in the context of the data encryption process?ITExamAnswers asked 2 years ago • Network DefenseWhich threat type describes the case when cloud computing resources are set up incorrectly?ITExamAnswers asked 2 years ago • Network DefenseWhich technology is used to verify the integrity of files to ensure they were not modified in transit?ITExamAnswers asked 2 years ago • Network DefenseWhich state of data refers to data moving between the CPU and the hard drive of a server?ITExamAnswers asked 2 years ago • Network DefenseIn which type of environment would a developer run software to verify that required security settings are met prior to production deployment?ITExamAnswers asked 2 years ago • Network DefenseWhat should be deployed to protect traffic confidentiality between a public cloud and a private cloud?ITExamAnswers asked 2 years ago • Network DefenseA company is deploying a product ordering system on a public cloud. The company IT specialist is working on security measures to protect the cloud resources. What are two possible negative impacts that should be considered when deploying a virtual firewall and an IPS appliance? (Choose two.)ITExamAnswers asked 2 years ago • Network DefenseWhich cloud security domain covers the challenges of delivering, measuring, and communicating compliances when organizations migrate from traditional data centers to the cloud?ITExamAnswers asked 2 years ago • Network DefenseWhat term is used to describe the phenomenon of more VMs than can be managed effectively?ITExamAnswers asked 2 years ago • Network DefenseWhen configuring a class map for a zone-based policy firewall, how is the match criteria applied when using the match-all parameter?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseIn what step of zone-based policy firewall configuration is traffic identified for policy application?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhen a Cisco IOS Zone-Based Policy Firewall is being configured, which two actions can be applied to a traffic class? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Network Defense