IT Questions Bank Which Windows log contains information about installations of software, including Windows updates?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich statement describes the threat to a public cloud due to a poor cloud security architecture strategy?ITExamAnswers asked 9 months ago • Network DefenseWhat is the function of the pass action on a Cisco IOS Zone-Based Policy Firewall?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA 3 v7, CCNA Security, CCNP, Network DefenseThe IT department is tasked to implement a system that controls what a user can and cannot do on the corporate network. Which process should be implemented to meet the requirement?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseMatch the security policy with the description. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat is a characteristic of a probabilistic analysis in an alert evaluation?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich two options are network security monitoring approaches that use advanced analytic techniques to analyze network telemetry data? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhat are two elements that form the PRI value in a syslog message? (Choose two.)IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhen ACLs are configured to block IP address spoofing and DoS flood attacks, which ICMP message should be allowed both inbound and outbound?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich ICMP message type should be stopped inbound?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhen implementing components into an enterprise network, what is the purpose of a firewall?IT Administrator asked 3 years ago • CCNA Security, Network DefenseTo facilitate the troubleshooting process, which inbound ICMP message should be permitted on an outside interface?ITExamAnswers asked 3 years ago • CCNA, CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseWhich protocol would be used to provide security for employees that access systems remotely from home?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhat is the most commonly deployed IPv6 NAT method recommended for all IPv6-based companies?ITExamAnswers asked 9 months ago • CCNA 2 v5