IT Questions Bank What three goals does a BYOD security policy accomplish? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseAn administrator discovers that a user is accessing a newly established website that may be detrimental to company security. What action should the administrator take first in terms of the security policy?IT Administrator asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich section of a security policy is used to specify that only authorized individuals should have access to enterprise data?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhat component of a security policy explicitly defines the type of traffic allowed on a network and what users are allowed and not allowed to do?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhat is the benefit of a defense-in-depth approach?IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWith the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, Network DefenseWhich device in a layered defense-in-depth approach denies connections initiated from untrusted networks to internal networks, but allows internal users within an organization to connect to untrusted networks?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseWhich device is usually the first line of defense in a layered defense-in-depth approach?ITExamAnswers asked 4 years ago • CCNA CyberOps, Network DefenseIn a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Network DefenseWhich security solution has the responsibility of monitoring suspicious processes that are running on a host and that might indicate infection of Trojan horse applications?ITExamAnswers asked 2 years ago • CCNA 4 v4An administrator is unable to receive e-mail. While troubleshooting the problem, the administrator is able to ping the local mail server IP address successfully from a remote network and can successfully resolve the mail server name to an IP address via the use of the nslookup command. At what layer of the OSI model is the problem most likely to be found?ITExamAnswers asked 2 years ago • CCNA 4 v4Refer to the exhibit. What is placed in the address field in the header of a frame that will travel from the San Jose router to the DC router?ITExamAnswers asked 2 years ago • CCNA 4 v4Refer to the exhibit. Computers on the internal network need access to all servers in the external network. The only traffic that is permitted from the external network must be responses to requests that are initiated on the internal network. Which security measure would satisfy this requirement?ITExamAnswers asked 2 years ago • CCNA 4 v4Which two statements are true about creating and applying access lists? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 4 v4A network administrator is instructing a technician on best practices for applying ACLs. Which two suggestions should the administrator provide? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 4 v4