IT Questions Bank Drag the security features on the left to the specific security risks they help protect against on the right. (Not all options are used.)ITExamAnswers asked 4 years agoWhich major component of the Cisco network virtualization architecture isolates users according to policy?ITExamAnswers asked 4 years agoWhich command can you enter in a network switch configuration so that learned mac addresses are saved in configuration as they connect?ITExamAnswers asked 4 years agoWhich port security violation mode allows traffic from valid mac address to pass but block traffic from invalid mac address?ITExamAnswers asked 4 years agoWhat is a difference between TACACS+ and RADIUS in AAA?ITExamAnswers asked 4 years agoRefer to the exhibit. Which user-mode password has just been set?ITExamAnswers asked 4 years agoWhat is the effect of using the service password-encryption command?ITExamAnswers asked 4 years agoWhich action can change the order of entries in a named access-list?ITExamAnswers asked 4 years agoIn order to comply with new auditing standards, a security administrator must be able to correlate system security alert logs directly with the employee who triggers the alert. Which of the following should the security administrator implement in order to meet this requirement?ITExamAnswers asked 4 years agoWhich two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two.)ITExamAnswers asked 4 years agoWhich two statements about TACACS+ are true? (Choose two.)ITExamAnswers asked 4 years agoWhere information about untrusted hosts are stored?ITExamAnswers asked 4 years agoWhich statement about recovering a password on a Cisco router is true?ITExamAnswers asked 4 years agoWhich item represents the standard IP ACL?ITExamAnswers asked 4 years agoWhat is a possible reason why a host is able to ping a web server but it is not able to do an HTTP request?ITExamAnswers asked 4 years ago