CH 7 & 8 HW and Exam Review

Descrição

CCNA SECURITY CH 7 & 8 HW and Exam Review
Anthony Schulmeister
Quiz por Anthony Schulmeister, atualizado more than 1 year ago
Anthony Schulmeister
Criado por Anthony Schulmeister quase 8 anos atrás
808
1

Resumo de Recurso

Questão 1

Questão
What are two symmetric encryption algorithms? (Choose two.)
Responda
  • 3DES
  • MD5
  • AES
  • HMAC
  • SHA

Questão 2

Questão
What is the reason for HMAC to use an additional secret key as input to the hash function?
Responda
  • to provide encryption
  • to provide authentication
  • to provide integrity verification
  • to prevent DoS attacks

Questão 3

Questão
If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?
Responda
  • DH
  • a private key
  • the same public key
  • a different public key

Questão 4

Questão
What is a difference between symmetric and asymmetric encryption algorithms?
Responda
  • Symmetric algorithms are typically hundreds to thousands of times slower than asymmetric algorithms.
  • Symmetric encryption algorithms are used to authenticate secure communications. Asymmetric encryption algorithms are used to repudiate messages.
  • Symmetric encryption algorithms are used to encrypt data. Asymmetric encryption algorithms are used to decrypt data.
  • Symmetric encryption algorithms use pre-shared keys. Asymmetric encryption algorithms use different keys to encrypt and decrypt data.

Questão 5

Questão
What is the purpose of the DH algorithm?
Responda
  • to provide nonrepudiation support
  • to support email data confidentiality
  • to encrypt data traffic after a VPN is established
  • to generate a shared key over an unsecured channel before data communications

Questão 6

Questão
Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash algorithm?
Responda
  • confidentiality
  • authentication
  • integrity
  • nonrepudiation

Questão 7

Questão
What is missing in the AH VPN?
Responda
  • confidentiality
  • integrity
  • authentication
  • secure key exchange
  • DH

Questão 8

Questão
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
Responda
  • confidentiality
  • integrity
  • authentication
  • secure key exchange

Questão 9

Questão
Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality?
Responda
  • AH
  • IP protocol 50
  • ESP
  • DH

Questão 10

Questão
The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks?
Responda
  • authentication
  • confidentiality
  • Diffie-Hellman
  • integrity
  • nonrepudiation

Questão 11

Questão
Refer to exhibit above. The site-to-site VPN is configured correctly between R1 and R3 for the communications from PC-A to PC-C. When PC-A sends out traffic to PC-C, what item in the following will be sent in plain text? (Choose the most likely one.)
Responda
  • The PC-A’s IP address
  • The PC-C’s IP address
  • The data inside the IP packet
  • The R1’s s0/0/1’s IP address

Questão 12

Questão
Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key?
Responda
  • The length of a key will not vary between encryption algorithms.
  • The length of a key does not affect the degree of security.
  • The shorter the key, the harder it is to break.
  • The longer the key, the more key possibilities exist.

Questão 13

Questão
Which statement describes a VPN?
Responda
  • VPNs use dedicated physical connections to transfer data between remote users.
  • VPNs use logical connections to create public networks through the Internet.
  • VPNs use open source virtualization software to create the tunnel through the Internet.
  • VPNs use virtual connections to create a private network through a public network.

Semelhante

CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Quiz Review
Rylan Blah
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls