IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network DefenseA user was hired by a company to provide a highly available network infrastructure. The user wants to build redundancy into the network in case of a switch failure, but wants to prevent Layer 2 looping. What would the user implement in the network?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhat is a characteristic of a layered defense-in-depth security approach?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich network monitoring tool is in the category of network protocol analyzers?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhat is the purpose of mobile device management (MDM) software?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich technique can be used to leverage virtual network topologies to run smaller and more isolated networks without incurring additional hardware costs?ITExamAnswers asked 2 years ago • Network DefenseWhich network service synchronizes the time across all devices on the network?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseAn administrator of a small data center wants a flexible, secure method of remotely connecting to servers.Which protocol would be best to use?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhat Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?IT Administrator asked 4 years ago • IT Essentials, Cybersecurity Essentials, Network DefenseWhat single access list statement matches all of the following networks?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, Network DefenseIn a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich three security services are provided by digital signatures? (Choose three.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefensePlace the steps for configuring zone-based policy (ZPF) firewalls in order from first to last. (Not all options are used.)IT Administrator asked 3 years ago • CCNA Security, Network DefenseWhich component of the zero trust security model focuses on secure access when an API, a microservice, or a container is accessing a database within an application?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhat is used by an application layer gateway to connect to remote servers on behalf of clients?ITExamAnswers asked 9 months ago • Network DefenseWhat effect does the use of hashing have on stored passwords?ITExamAnswers asked 9 months ago • Network Defense