IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network Security 1.0What are two best practices when implementing firewall security policies?ITExamAnswers asked 2 years ago • Network Security 1.0Which three statements describe trusted and untrusted areas of the network? (Choose three.)ITExamAnswers asked 2 years ago • Network Security 1.0Which security design uses different types of firewalls and security measures that are combined at different areas of the network to add depth to the security of an organization ?ITExamAnswers asked 2 years ago • Network Security 1.0Which network security design typically uses one inside interface, one outside interface, and one DMZ interface?ITExamAnswers asked 2 years ago • Network Security 1.0Which type of firewall is a PC or server with firewall software running on it?ITExamAnswers asked 2 years ago • Network Security 1.0A way to control who is permitted to access a network.ITExamAnswers asked 2 years ago • Network Security 1.0Provides leverage against individuals who perform malicious actions.ITExamAnswers asked 2 years ago • Network Security 1.0Specifies which resources the user can access and which operations the user is allowed to perform.ITExamAnswers asked 2 years ago • Network Security 1.0What a user can and cannot do on the network.ITExamAnswers asked 2 years ago • Network Security 1.0Users and administrators must prove that they are who they say they are.ITExamAnswers asked 2 years ago • Network Security 1.0Collects and reports usage data so that it can be employed for purposes such as auditing or billing.ITExamAnswers asked 2 years ago • Network Security 1.0Established using username and password combinations, challenge and response questions, token cards, and other methods.ITExamAnswers asked 2 years ago • Network Security 1.0Uses a created set of attributes that describes the user’s access to the network.ITExamAnswers asked 2 years ago • Network Security 1.0Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.ITExamAnswers asked 2 years ago • Network Security 1.0Refer to the following syslog output to answer the questions. *Jun 12 17:46:01.619: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory Refer to the syslog output. What security level generated the message?ITExamAnswers asked 2 years ago • Network Security 1.0