CH 7 & 8 HW and Exam Review

Descripción

CCNA SECURITY CH 7 & 8 HW and Exam Review
Anthony Schulmeister
Test por Anthony Schulmeister, actualizado hace más de 1 año
Anthony Schulmeister
Creado por Anthony Schulmeister hace casi 8 años
808
1

Resumen del Recurso

Pregunta 1

Pregunta
What are two symmetric encryption algorithms? (Choose two.)
Respuesta
  • 3DES
  • MD5
  • AES
  • HMAC
  • SHA

Pregunta 2

Pregunta
What is the reason for HMAC to use an additional secret key as input to the hash function?
Respuesta
  • to provide encryption
  • to provide authentication
  • to provide integrity verification
  • to prevent DoS attacks

Pregunta 3

Pregunta
If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?
Respuesta
  • DH
  • a private key
  • the same public key
  • a different public key

Pregunta 4

Pregunta
What is a difference between symmetric and asymmetric encryption algorithms?
Respuesta
  • Symmetric algorithms are typically hundreds to thousands of times slower than asymmetric algorithms.
  • Symmetric encryption algorithms are used to authenticate secure communications. Asymmetric encryption algorithms are used to repudiate messages.
  • Symmetric encryption algorithms are used to encrypt data. Asymmetric encryption algorithms are used to decrypt data.
  • Symmetric encryption algorithms use pre-shared keys. Asymmetric encryption algorithms use different keys to encrypt and decrypt data.

Pregunta 5

Pregunta
What is the purpose of the DH algorithm?
Respuesta
  • to provide nonrepudiation support
  • to support email data confidentiality
  • to encrypt data traffic after a VPN is established
  • to generate a shared key over an unsecured channel before data communications

Pregunta 6

Pregunta
Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash algorithm?
Respuesta
  • confidentiality
  • authentication
  • integrity
  • nonrepudiation

Pregunta 7

Pregunta
What is missing in the AH VPN?
Respuesta
  • confidentiality
  • integrity
  • authentication
  • secure key exchange
  • DH

Pregunta 8

Pregunta
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
Respuesta
  • confidentiality
  • integrity
  • authentication
  • secure key exchange

Pregunta 9

Pregunta
Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality?
Respuesta
  • AH
  • IP protocol 50
  • ESP
  • DH

Pregunta 10

Pregunta
The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks?
Respuesta
  • authentication
  • confidentiality
  • Diffie-Hellman
  • integrity
  • nonrepudiation

Pregunta 11

Pregunta
Refer to exhibit above. The site-to-site VPN is configured correctly between R1 and R3 for the communications from PC-A to PC-C. When PC-A sends out traffic to PC-C, what item in the following will be sent in plain text? (Choose the most likely one.)
Respuesta
  • The PC-A’s IP address
  • The PC-C’s IP address
  • The data inside the IP packet
  • The R1’s s0/0/1’s IP address

Pregunta 12

Pregunta
Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key?
Respuesta
  • The length of a key will not vary between encryption algorithms.
  • The length of a key does not affect the degree of security.
  • The shorter the key, the harder it is to break.
  • The longer the key, the more key possibilities exist.

Pregunta 13

Pregunta
Which statement describes a VPN?
Respuesta
  • VPNs use dedicated physical connections to transfer data between remote users.
  • VPNs use logical connections to create public networks through the Internet.
  • VPNs use open source virtualization software to create the tunnel through the Internet.
  • VPNs use virtual connections to create a private network through a public network.
Mostrar resumen completo Ocultar resumen completo

Similar

CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Quiz Review
Rylan Blah
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls