IT Questions Bank Which three statements accurately describe a security policy? (Choose three.)ITExamAnswers asked 1 year ago • CCNA 4 v4Which step should be taken next once a problem is resolved during a troubleshooting process?ITExamAnswers asked 1 year ago • Network Addressing and Basic Troubleshooting, Networking EssentialsRefer to the exhibit. A web designer calls to report that the web server web-s1.cisco.com is not reachable through a web browser. The technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.)IT Administrator asked 4 years ago • CCNA, Networking Devices and Initial Configuration, Networking EssentialsWhich three items should be documented after troubleshooting an internal web server crash? (Choose three.)ITExamAnswers asked 1 year ago • Networking EssentialsWhich command would a technician use to display network connections on a host computer?ITExamAnswers asked 3 years ago • Networking Basics, Networking EssentialsA network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?ITExamAnswers asked 4 years ago • CCNA CyberOps, Networking EssentialsA small office uses a wireless router to connect to a cable modem for Internet access. The network administrator receives a call that one office computer cannot access external websites. The first troubleshooting step that the network administrator performs is to ping the wireless router from the office computer. Which troubleshooting technique does this represent?ITExamAnswers asked 3 years ago • Networking EssentialsRefer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem?ITExamAnswers asked 4 years ago • Networking EssentialsWhich command can be used to encrypt all passwords in the configuration file?ITExamAnswers asked 1 year ago • Networking EssentialsCompany policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. Which of the following router commands achieves the goal of providing the highest level of security?ITExamAnswers asked 4 years ago • Networking EssentialsWhat happens when the transport input ssh command is entered on the switch vty lines?ITExamAnswers asked 4 years ago • CCNA, CCNA 3 v4, CCNP, Networking Devices and Initial Configuration, Networking EssentialsRefer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?ITExamAnswers asked 2 years ago • Networking Devices and Initial Configuration, Networking EssentialsWhat is one difference between using Telnet or SSH to connect to a network device for management purposes?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v6, CCNA 2 v7, CCNA Security, Networking Devices and Initial Configuration, Networking EssentialsWhat is the effect of using the Router# copy running-config startup-config command on a router?ITExamAnswers asked 4 years ago • CCNA, Network Fundamentals, Networking EssentialsOn which switch interface would an administrator configure an IP address so that the switch can be managed remotely?ITExamAnswers asked 4 years ago • CCNA, Networking Devices and Initial Configuration, Networking Essentials