IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network DefenseWhat three goals does a BYOD security policy accomplish? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseAn administrator discovers that a user is accessing a newly established website that may be detrimental to company security. What action should the administrator take first in terms of the security policy?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich section of a security policy is used to specify that only authorized individuals should have access to enterprise data?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat component of a security policy explicitly defines the type of traffic allowed on a network and what users are allowed and not allowed to do?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhat is the benefit of a defense-in-depth approach?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWith the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich device in a layered defense-in-depth approach denies connections initiated from untrusted networks to internal networks, but allows internal users within an organization to connect to untrusted networks?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich device is usually the first line of defense in a layered defense-in-depth approach?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseIn a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich statement describes a typical security policy for a DMZ firewall configuration?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich zone-based policy firewall zone is system-defined and applies to traffic destined for the router or originating from the router?IT Administrator asked 3 years ago • CCNA Security, CCNA Security v1.2, Network DefenseWhen using Cisco IOS zone-based policy firewall, where is the inspection policy applied?IT Administrator asked 3 years ago • CCNA Security, CCNA Security v1.2, Network DefenseWhich two features are included by both TACACS+ and RADIUS protocols? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhat is indicated by a Snort signature ID that is below 3464?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseA network administrator is trying to download a valid file from an internal server. However, the process triggers an alert on a NMS tool. What condition describes this alert?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network Defense