IT Questions Bank What AAA component assigns varying levels of rights to users of network resources?ITExamAnswers asked 8 months ago • CCNA Discovery v4What are two potential problems with using tape media to back up server data? (Choose two.)ITExamAnswers asked 8 months ago • CCNA Discovery v4Before a technician upgrades a server, it is necessary to back up all data. Which type of backup is necessary to ensure that all data is backed up?ITExamAnswers asked 8 months ago • CCNA Discovery v4Which benefit does SSH offer over Telnet when remotely managing a router?ITExamAnswers asked 8 months ago • CCNA Discovery v4Which three protocols describe methods that can be used to secure user data for transmission across the internet? (Choose three.)ITExamAnswers asked 8 months ago • CCNA Discovery v4What is the term for the public network between the boundary router and the firewall?ITExamAnswers asked 8 months ago • CCNA Discovery v4Which three protocols are used for in-band management? (Choose three.)ITExamAnswers asked 8 months ago • CCNA Discovery v4What is the advantage of using WPA to secure a wireless network?ITExamAnswers asked 8 months ago • CCNA Discovery v4Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.)ITExamAnswers asked 8 months ago • CCNA Discovery v4What network layer security protocol can secure any application layer protocol used for communication?ITExamAnswers asked 8 months ago • CCNA Discovery v4Which means of communication does an SNMP network agent use to provide a network management station with important but unsolicited information?ITExamAnswers asked 8 months ago • CCNA Discovery v4What two measures help to verify that server backups have been reliably completed? (Choose two.)ITExamAnswers asked 8 months ago • CCNA Discovery v4A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?IT Administrator asked 3 years ago • CCNA CyberOps, CCNA Discovery v4, CCNA SecurityA company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?ITExamAnswers asked 8 months ago • CCNA Discovery v4A network administrator is assigning network permissions to new groups of users and employing the principle of least privilege. Which two actions should the administrator take? (Choose two.)ITExamAnswers asked 8 months ago • CCNA Discovery v4