IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network DefenseYou have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhen implementing a ZPF, what is the default security setting when forwarding traffic between two interfaces in the same zone?IT Administrator asked 3 years ago • CCNA Security, Network DefenseFor network systems, which management system addresses the inventory and control of hardware and software configurations?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich Windows log contains information about installations of software, including Windows updates?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich statement describes the threat to a public cloud due to a poor cloud security architecture strategy?ITExamAnswers asked 9 months ago • Network DefenseWhat is the function of the pass action on a Cisco IOS Zone-Based Policy Firewall?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA 3 v7, CCNA Security, CCNP, Network DefenseThe IT department is tasked to implement a system that controls what a user can and cannot do on the corporate network. Which process should be implemented to meet the requirement?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseMatch the security policy with the description. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat is a characteristic of a probabilistic analysis in an alert evaluation?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich two options are network security monitoring approaches that use advanced analytic techniques to analyze network telemetry data? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhat are two elements that form the PRI value in a syslog message? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhen ACLs are configured to block IP address spoofing and DoS flood attacks, which ICMP message should be allowed both inbound and outbound?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich ICMP message type should be stopped inbound?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhen implementing components into an enterprise network, what is the purpose of a firewall?IT Administrator asked 3 years ago • CCNA Security, Network Defense