IT Questions Bank What is a key difference between the data captured by NetFlow and data captured by Wireshark?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich type of firewall is commonly part of a router firewall and allows or blocks traffic based on Layer 3 and Layer 4 information?IT Administrator asked 3 years ago • CCNA Security, Network DefenseWhich cloud security domain describes controls related to securing the data itself?ITExamAnswers asked 2 years ago • Network DefenseA user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseA user was hired by a company to provide a highly available network infrastructure. The user wants to build redundancy into the network in case of a switch failure, but wants to prevent Layer 2 looping. What would the user implement in the network?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhat is a characteristic of a layered defense-in-depth security approach?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich network monitoring tool is in the category of network protocol analyzers?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhat is the purpose of mobile device management (MDM) software?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich technique can be used to leverage virtual network topologies to run smaller and more isolated networks without incurring additional hardware costs?ITExamAnswers asked 2 years ago • Network DefenseWhich network service synchronizes the time across all devices on the network?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseAn administrator of a small data center wants a flexible, secure method of remotely connecting to servers.Which protocol would be best to use?ITExamAnswers asked 2 years ago • Cybersecurity Essentials, Network DefenseWhat Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?IT Administrator asked 4 years ago • IT Essentials, Cybersecurity Essentials, Network DefenseWhat single access list statement matches all of the following networks?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, Network DefenseIn a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, CCNA Security v1.2, Network DefenseIf traditional phones are used when introducing VoIP to a network, what component would be required to convert the analog voice from traditional telephone signals into IP packets?ITExamAnswers asked 7 months ago • CCNA Discovery v4