IT Questions Bank Which statement is true about a DMZ in a traditional network firewall design?ITExamAnswers asked 8 months ago • CCNA Discovery v4Refer to the exhibit. If the firewall module has been correctly configured using best practices for network security, which statement is true about the security design for the network?ITExamAnswers asked 8 months ago • CCNA Discovery v4A network designer is creating a new network. The design must offer enough redundancy to provide protection against a single link or device failure, yet must not be too complex or expensive to implement. What topology would fill these needs?ITExamAnswers asked 8 months ago • CCNA Discovery v4Which three statements describe the functions of the Cisco hierarchical network design model? (Choose three.)ITExamAnswers asked 2 years ago • CCNA Discovery v4, IT Essentials 8, Networking Devices and Initial ConfigurationWhat are two mechanisms that provide redundancy for server farm implementations? (Choose two.)ITExamAnswers asked 8 months ago • CCNA Discovery v4A customer calls the help line to report a computer problem. The help line technician responds and works with the customer for some time. However, the technician cannot identify the root cause of the problem. What should the technician do to help the customer?ITExamAnswers asked 3 years ago • Networking EssentialsA student is uploading files from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the devices?ITExamAnswers asked 3 years ago • Networking EssentialsWhich two statements describe characteristics of network addresses? (Choose two.)IT Administrator asked 4 years ago • IT Essentials, Networking EssentialsRefer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)IT Administrator asked 4 years ago • Networking EssentialsWhen configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNP, Networking Devices and Initial Configuration, Networking EssentialsA host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?ITExamAnswers asked 3 years ago • Networking Basics, Networking EssentialsWhich type of device filtering can be enabled on some wireless access points or wireless routers?ITExamAnswers asked 3 years ago • Networking EssentialsWhich type of access is secured on a Cisco router or switch with the enable secret command?ITExamAnswers asked 4 years ago • CCNA Security, Networking Devices and Initial Configuration, Networking EssentialsMatch the commands to the correct actions. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNA, Networking EssentialsAn intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?ITExamAnswers asked 3 years ago • Networking Essentials