What are two symmetric encryption algorithms? (Choose two.)
Respuesta
3DES
MD5
AES
HMAC
SHA
Pregunta 2
Pregunta
What is the reason for HMAC to use an additional secret key as input to the hash function?
Respuesta
to provide encryption
to provide authentication
to provide integrity verification
to prevent DoS attacks
Pregunta 3
Pregunta
If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?
Respuesta
DH
a private key
the same public key
a different public key
Pregunta 4
Pregunta
What is a difference between symmetric and asymmetric encryption algorithms?
Respuesta
Symmetric algorithms are typically hundreds to thousands of times slower than asymmetric algorithms.
Symmetric encryption algorithms are used to authenticate secure communications. Asymmetric encryption algorithms are used to repudiate messages.
Symmetric encryption algorithms are used to encrypt data. Asymmetric encryption algorithms are used to decrypt data.
Symmetric encryption algorithms use pre-shared keys. Asymmetric encryption algorithms use different keys to encrypt and decrypt data.
Pregunta 5
Pregunta
What is the purpose of the DH algorithm?
Respuesta
to provide nonrepudiation support
to support email data confidentiality
to encrypt data traffic after a VPN is established
to generate a shared key over an unsecured channel before data communications
Pregunta 6
Pregunta
Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash algorithm?
Respuesta
confidentiality
authentication
integrity
nonrepudiation
Pregunta 7
Pregunta
What is missing in the AH VPN?
Respuesta
confidentiality
integrity
authentication
secure key exchange
DH
Pregunta 8
Pregunta
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
Respuesta
confidentiality
integrity
authentication
secure key exchange
Pregunta 9
Pregunta
Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality?
Respuesta
AH
IP protocol 50
ESP
DH
Pregunta 10
Pregunta
The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks?
Respuesta
authentication
confidentiality
Diffie-Hellman
integrity
nonrepudiation
Pregunta 11
Pregunta
Refer to exhibit above. The site-to-site VPN is configured correctly between R1 and R3 for the communications from PC-A to PC-C. When PC-A sends out traffic to PC-C, what item in the following will be sent in plain text? (Choose the most likely one.)