IT Questions Bank A network administrator is setting up a web server for a small advertising office and is concerned with data availability. The administrator wishes to implement disk fault tolerance using the minimum number of disks required. Which RAID level should the administrator choose?ITExamAnswers asked 2 years ago • IT Essentials, IT Essentials 8, Network DefenseWhat is the purpose of the network security authentication function?ITExamAnswers asked 4 years ago • CCNA, Network DefenseWhat is one limitation of a stateful firewall?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich technology would be used to create the server logs generated by network devices and reviewed by an entry level network person who works the night shift at a data center?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich key component of virtualization allows for running multiple independent operating systems on one physical computing system?ITExamAnswers asked 2 years ago • Network DefenseWhat device would be used as the third line of defense in a defense-in-depth approach?ITExamAnswers asked 2 years ago • CCNA CyberOps, Network DefenseWhat technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseA company wants to implement biometric access to its data center. The company is concerned with people being able to circumvent the system by being falsely accepted as legitimate users. What type of error is false acceptance?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhat method is used to apply an IPv6 ACL to a router interface?ITExamAnswers asked 4 years ago • CCNA, CCNA 4 v6, CCNP, Network DefenseIn which way does the use of HTTPS increase the security monitoring challenges within enterprise networks?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseA threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes the lack of alert?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich tool included in Security Onion is an interactive dashboard interface to Elasticsearch data?ITExamAnswers asked 2 years ago • CCNA CyberOps, Network DefenseWhat is one benefit of using a next-generation firewall rather than a stateful firewall?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich technique is necessary to ensure a private transfer of data using a VPN?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA, CCNA Security, Network DefensePasswords, passphrases, and PINs are examples of which security term?IT Administrator asked 4 years ago • CCNA CyberOps, Cybersecurity Essentials, Network Defense