IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network DefenseTo facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?ITExamAnswers asked 3 years ago • CCNA, CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich protocol would be used to provide security for employees that access systems remotely from home?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhich command is used to activate an IPv6 ACL named ENG_ACL on an interface so that the router filters traffic prior to accessing the routing table?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v5, CCNA Security, CCNA Security v1.2, CCNP, Network DefenseIn applying an ACL to a router interface, which traffic is designated as outbound?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v5, CCNA Security, Network DefenseA company is deploying a customer service web application on AWS. A network administrator is installing and configuring a VM instance. Which three actions should the administrator take to protect the VM? (Choose three.)IT Administrator asked 10 months ago • Network DefenseWhich security measure is typically found both inside and outside a data center facility?ITExamAnswers asked 3 years ago • CCNA Security, Endpoint Security, Network DefenseWhat is the purpose of a DMZ?ITExamAnswers asked 3 years ago • Network Defense, Networking EssentialsIn which configuration would an outbound ACL placement be preferred over an inbound ACL placement?ITExamAnswers asked 4 years ago • CCNA 2 v6, CCNA 3 v7, CCNA 4 v6, Network DefenseWhich type of server would support the SMTP, POP, and IMAP protocols?ITExamAnswers asked 4 years ago • IT Essentials, CCNA CyberOps, IT Essentials 8, Network DefenseWhich tool would an analyst use to start a workflow investigation?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich alert classification indicates that exploits are not being detected by installed security systems?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich type of analysis relies on different methods to establish the likelihood that a security event has happened or will happen?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhat classification is used for an alert that correctly identifies that an exploit has occurred?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhat function is provided by Snort as part of the Security Onion?IT Administrator asked 3 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat are three analysis tools that are integrated into Security Onion? (Choose three.)ITExamAnswers asked 2 years ago • CCNA CyberOps, Network Defense