CCNA Security Chapter 7 Exam

Beschreibung

CCNA Security Chapter 7 Exam
d94829 d94829
Quiz von d94829 d94829, aktualisiert more than 1 year ago
d94829 d94829
Erstellt von d94829 d94829 vor etwa 6 Jahre
790
2

Zusammenfassung der Ressource

Frage 1

Frage
What is the focus of cryptanalysis?
Antworten
  • hiding secret codes
  • developing secret codes
  • breaking encrypted codes
  • implementing encrypted codes

Frage 2

Frage
How many bits does the Data Encryption Standard (DES) use for data encryption?
Antworten
  • 40 bits
  • 56 bits
  • 64 bits
  • 72 bits

Frage 3

Frage
Which statement describes the Software-Optimized Encryption Algorithm (SEAL)?
Antworten
  • SEAL is a stream cipher
  • It uses a 112-bit encryption key.
  • It is an example of an asymmetric algorithm.
  • It requires more CPU resources than software-based AES does.

Frage 4

Frage
Which encryption algorithm is an asymmetric algorithm?
Antworten
  • DH
  • SEAL
  • 3DES
  • AES

Frage 5

Frage
An online retailer needs a service to support the nonrepudiation of the transaction. Which component is used for this service?
Antworten
  • the private key of the retailer
  • the unique shared secret known only by the retailer and the customer
  • the public key of the retailer
  • the digital signatures

Frage 6

Frage
In which situation is an asymmetric key algorithm used
Antworten
  • Two Cisco routers authenticate each other with CHAP
  • User data is transmitted across the network after a VPN is established
  • An office manager encrypts confidential files before saving them to a removable device
  • ِِِA network administrator connects to a Cisco router with SSH

Frage 7

Frage
What is the purpose of a nonrepudiation service in secure communications?
Antworten
  • to ensure that encrypted secure communications cannot be decoded
  • to confirm the identity of the recipient of the communications
  • to provide the highest encryption level possible
  • to ensure that the source of the communications is confirmed

Frage 8

Frage
Which objective of secure communications is achieved by encrypting data
Antworten
  • integrity
  • authentication
  • confidentiality
  • availability

Frage 9

Frage
Why is the 3DES algorithm often preferred over the AES algorithm
Antworten
  • 3DES is more trusted because it has been proven secure for a longer period than AES
  • AES is more expensive to implement than 3DES.
  • 3DES performs better in high-throughput, low-latency environments than AES
  • Major networking equipment vendors such as Cisco have not yet adopted AES.

Frage 10

Frage
What is the most common use of the Diffie-Helman algorithm in communications security?
Antworten
  • to create password hashes for secure authentication
  • to provide routing protocol authentication between routers
  • to encrypt data for secure e-commerce communications
  • to secure the exchange of keys used to encrypt data

Frage 11

Frage
Which type of encryption algorithm uses public and private keys to provide authentication, integrity, and confidentiality?
Antworten
  • symmetric
  • shared secret
  • IPsec
  • asymmetric

Frage 12

Frage
How do modern cryptographers defend against brute-force attacks
Antworten
  • Use statistical analysis to eliminate the most common encryption keys.
  • Use a keyspace large enough that it takes too much money and too much time to conduct a successful attack
  • Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successful attack
  • Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message

Frage 13

Frage
Which encryption protocol provides network layer confidentiality?
Antworten
  • IPsec protocol suite
  • Transport Layer Security
  • Secure Hash Algorithm 1
  • Secure Sockets Layer
  • Keyed MD5
  • Message Digest 5

Frage 14

Antworten
  • RC4
  • AES
  • 3DES
  • DES
  • SEAL

Frage 15

Frage
Which statement describes asymmetric encryption algorithms?
Antworten
  • They have key lengths ranging from 80 to 256 bits
  • They include DES, 3DES, and AES.
  • They are also called shared-secret key algorithms.
  • They are relatively slow because they are based on difficult computational algorithms

Frage 16

Frage
Which two non-secret numbers are initially agreed upon when the Diffie-Hellman algorithm is used? (Choose two.)
Antworten
  • binomial coefficient
  • generator
  • elliptic curve invariant
  • prime modulus
  • topological index
  • pseudorandom nome

Frage 17

Frage
In what situation would an asymmetric algorithm most likely be used?
Antworten
  • logging onto a computer
  • making an online purchase
  • uploading a networking book chapter using FTP
  • transferring a large stream of data between two corporate locations

Frage 18

Frage
Why is asymmetric algorithm key management simpler than symmetric algorithm key management?
Antworten
  • It uses fewer bits.
  • Only one key is used.
  • Two public keys are used for the key exchange.
  • One of the keys can be made public.

Frage 19

Frage
What is the purpose of code signing
Antworten
  • source identity secrecy
  • integrity of source .EXE files
  • reliable transfer of data
  • data encryption

Frage 20

Frage
Which algorithm can ensure data confidentiality?
Antworten
  • MD5
  • PKI
  • RSA
  • AES

Frage 21

Frage
What is the purpose of a digital certificate?
Antworten
  • It guarantees that a website has not been hacked
  • It authenticates a website and establishes a secure connection to exchange confidential data.
  • It provides proof that data has a traditional signature attached
  • It ensures that the person who is gaining access to a network device is authorized.

Frage 22

Frage
Fill in the blank. A shared secret is a key used in a ___________ encryption algorithm
Antworten
  • symmetric
  • NONsymmetric
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Quiz Review
Rylan Blah
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls