IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network DefenseA network administrator is reviewing server alerts because of reports of network slowness. The administrator confirms that an alert was an actual security incident. What is the security alert classification of this type of scenario?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich information can be provided by the Cisco NetFlow utility?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich two tools have a GUI interface and can be used to view and analyze full packet captures? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseRefer to the exhibit. Which technology generated the event log?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNP, Network DefenseHow can IMAP be a security threat to a company?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseBefore data is sent out for analysis, which technique can be used to replace sensitive data in nonproduction environments to protect the underlying information?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhat are two methods to maintain certificate revocation status? (Choose two.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseA company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. This code is changed every day. Which two algorithms can be used to achieve this task? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseA company is using a public cloud provider to host its software development and distribution processes. What two cloud resources is the company solely responsible for in the shared security responsibility model? (Choose two.)ITExamAnswers asked 2 years ago • Network DefenseWhat is the function of SDKs in application development?ITExamAnswers asked 2 years ago • Network DefenseWhich two advantages in security controls are provided by software-defined networks (SDN) over traditional network security solutions? (Choose two.)ITExamAnswers asked 2 years ago • Network DefenseWhich statement describes Cisco IOS Zone-Based Policy Firewall operation?ITExamAnswers asked 3 years ago • CCNP, Network DefenseDesigning a ZPF requires several steps. Which step involves dictating the number of devices between most-secure and least-secure zones and determining redundant devices?IT Administrator asked 3 years ago • CCNA Security, Network DefenseWhich type of firewall makes use of a proxy server to connect to remote servers on behalf of clients?IT Administrator asked 3 years ago • CCNA Security, Network DefenseWhat are two differences between stateful and stateless firewalls? (Choose two.)IT Administrator asked 3 years ago • CCNA Security, Network Defense