CH 7 & 8 HW and Exam Review

Beschreibung

CCNA SECURITY CH 7 & 8 HW and Exam Review
Anthony Schulmeister
Quiz von Anthony Schulmeister, aktualisiert more than 1 year ago
Anthony Schulmeister
Erstellt von Anthony Schulmeister vor mehr als 7 Jahre
787
1

Zusammenfassung der Ressource

Frage 1

Frage
What are two symmetric encryption algorithms? (Choose two.)
Antworten
  • 3DES
  • MD5
  • AES
  • HMAC
  • SHA

Frage 2

Frage
What is the reason for HMAC to use an additional secret key as input to the hash function?
Antworten
  • to provide encryption
  • to provide authentication
  • to provide integrity verification
  • to prevent DoS attacks

Frage 3

Frage
If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?
Antworten
  • DH
  • a private key
  • the same public key
  • a different public key

Frage 4

Frage
What is a difference between symmetric and asymmetric encryption algorithms?
Antworten
  • Symmetric algorithms are typically hundreds to thousands of times slower than asymmetric algorithms.
  • Symmetric encryption algorithms are used to authenticate secure communications. Asymmetric encryption algorithms are used to repudiate messages.
  • Symmetric encryption algorithms are used to encrypt data. Asymmetric encryption algorithms are used to decrypt data.
  • Symmetric encryption algorithms use pre-shared keys. Asymmetric encryption algorithms use different keys to encrypt and decrypt data.

Frage 5

Frage
What is the purpose of the DH algorithm?
Antworten
  • to provide nonrepudiation support
  • to support email data confidentiality
  • to encrypt data traffic after a VPN is established
  • to generate a shared key over an unsecured channel before data communications

Frage 6

Frage
Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash algorithm?
Antworten
  • confidentiality
  • authentication
  • integrity
  • nonrepudiation

Frage 7

Frage
What is missing in the AH VPN?
Antworten
  • confidentiality
  • integrity
  • authentication
  • secure key exchange
  • DH

Frage 8

Frage
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
Antworten
  • confidentiality
  • integrity
  • authentication
  • secure key exchange

Frage 9

Frage
Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality?
Antworten
  • AH
  • IP protocol 50
  • ESP
  • DH

Frage 10

Frage
The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks?
Antworten
  • authentication
  • confidentiality
  • Diffie-Hellman
  • integrity
  • nonrepudiation

Frage 11

Frage
Refer to exhibit above. The site-to-site VPN is configured correctly between R1 and R3 for the communications from PC-A to PC-C. When PC-A sends out traffic to PC-C, what item in the following will be sent in plain text? (Choose the most likely one.)
Antworten
  • The PC-A’s IP address
  • The PC-C’s IP address
  • The data inside the IP packet
  • The R1’s s0/0/1’s IP address

Frage 12

Frage
Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key?
Antworten
  • The length of a key will not vary between encryption algorithms.
  • The length of a key does not affect the degree of security.
  • The shorter the key, the harder it is to break.
  • The longer the key, the more key possibilities exist.

Frage 13

Frage
Which statement describes a VPN?
Antworten
  • VPNs use dedicated physical connections to transfer data between remote users.
  • VPNs use logical connections to create public networks through the Internet.
  • VPNs use open source virtualization software to create the tunnel through the Internet.
  • VPNs use virtual connections to create a private network through a public network.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Quiz Review
Rylan Blah
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls