IT Questions Bank Which type of firewall is commonly part of a router firewall and allows or blocks traffic based on Layer 3 or 4 information?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhat are two benefits of implementing a firewall in a network? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhat are two characteristics of an application gateway firewall? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhich statement is a characteristic of a packet filtering firewall?ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseConsider the following access list. Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)ITExamAnswers asked 3 years ago • CCNA Security, Network DefenseWhat is the quickest way to remove a single ACE from a named ACL?ITExamAnswers asked 4 years ago • CCNA Security, Network DefenseWhich scenario would cause an ACL misconfiguration and deny all traffic?ITExamAnswers asked 3 years ago • CCNA, CCNA Security, Network DefenseRefer to the exhibit. A network administrator is configuring an IPv6 ACL to allow hosts on the 2001:DB8:CAFÉ:10::/64 network to access remote web servers, except for PC1. However, a user on PC1 can successfully access the web server PC2. Why is this possible?ITExamAnswers asked 3 years ago • CCNA Security, CCNP, Network DefenseWhat type of ACL offers greater flexibility and control over network access?ITExamAnswers asked 4 years ago • CCNA Security, Network DefenseWhich two statements describe appropriate general guidelines for configuring and applying ACLs? (Choose two.)ITExamAnswers asked 3 years ago • CCNA, CCNA Security, CCNA Security v1.2, Network DefenseRefer to the exhibit. A network administrator wants to create a standard ACL to prevent network 1 traffic from being transmitted to the Research and Development network. On which router interface and in which direction should the standard ACL be applied?ITExamAnswers asked 3 years ago • CCNA Security, CCNP, Network DefenseWhich AAA component can be established using token cards?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat is used to scan a BYOD device to verify that it is compliant with company security policies before the device is permitted to access the network?ITExamAnswers asked 2 years ago • Network DefenseBecause of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA, CCNA Security, Network DefenseWhat is the purpose of the network security accounting function?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOps, CCNA Security, Network Defense