Anda di halaman 1dari 5

Cisco CCNA Security, chapter 7 Exam.

Questions and answers 100% correct.


1. Which symmetrical encryption algorithm is the most difficult to crack?
3DES
AES
DES
RSA
SHA

2. What is the basic method used by 3DES to encrypt plaintext?


The data is encrypted three times with three different keys.
The data is encrypted, decrypted, and encrypted using three different keys.
The data is divided into three blocks of equal length for encryption.
The data is encrypted using a key length that is three times longer than the key
used for DES.

3. What does it mean when a hashing algorithm is collision resistant?


Exclusive ORs are performed on input data and produce a digest.
It is not feasible to compute the hash given the input data.
It uses a two-way
way function that computes a hash from the input and output data.
Two messages with the same hash are unlikely
unl to occur.

4. Which three primary functions are required to secure communication across network
links? (Choose three.)
accounting
anti-replay
replay protection
authentication
authorization
confidentiality
integrity

5. Which two encryption algorithms are commonly used to encrypt the contents of a
message? (Choose two.)
3DES
AES
IPsec
PKI
SHA

6. Which statement describes asymmetric encryption algorithms?


They include DES, 3DES, and AES.
They have key lengths ranging from 80 to 256 bits.
They are also called shared-secret
shared key algorithms.
They are relatively slow because they are based on difficult computational
algorithms.

7. Which statement describes the use of keys for encryption?


The sender and receiver must use the same key when using symmetric encryption.
The sender and receiver must use the same key when using asymmetric
encryption.
The sender and receiver must use the
the same keys for both symmetric and
asymmetric encryption.
The sender and receiver must use two keys: one for symmetric encryption and
another for asymmetric encryption.

8. How do modern cryptographers defend against brute-force


brute attacks?
Use statistical analysis to eliminate the most common encryption keys.
Use an algorithm that requires the attacker to have both ciphertext and plaintext to
conduct a successful
ful attack.
Use a keyspace large enough that it takes too much money and too much time to
conduct a successful attack.
Use frequency analysis to ensure that the most popular letters used in the language
are not used in the cipher message.

9.

Refer to the exhibit. Which type of cipher method is depicted?


Caesar cipher
stream cipher
substitution cipher
transposition cipher
10. Which statement describes a cryptographic hash function?
A one-way
way cryptographic hash function is hard to invert.
The output of a cryptographic hash function can be any length.
The input off a cryptographic hash function has a fixed length.
A cryptographic hash function is used to provide confidentiality.

11. A customer purchases an item from an e-commerce


e site. The e-commerce
commerce site must
maintain proof that the data exchange took place between the site and the customer.
Which feature of digital signatures is required?
authenticity of digitally signed data
integrity of digitally signed data
nonrepudiation of the transaction
confidentiality of the public key

12. Which encryption protocol provides network layer confidentiality?


IPsec protocol suite
Keyed MD5
Message Digest 5
Secure Sockets Layer
Secure Hash Algorithm 1
Transport Layer Security

13. Which statement is a feature of HMAC?


HMAC is based on the RSA hash function.
HMAC uses a secret key that is only known to the sender and defeats man-in-
man
the-middle attacks.
HMAC uses a secret key as input to the hash function, adding
adding authentication to
integrity assurance.
HMAC uses protocols such as SSL or TLS to provide session layer
confidentiality.

14. The network administrator for an e-commerce


e website requires a service that
prevents customers from claiming that legitimate orders are fake. What service
provides this type of guarantee?
authentication
confidentiality
integrity
nonrepudiation

15. What is a characteristic of the RSA algorithm?


RSA is much faster than DES.
RSA is a common symmetric algorithm.
RSA is used to protect corporate data in high-throughput,
high low-latency
latency
environments.
RSA keys of 512 bits can be used for faster processing, while keys of 2048 bits
can be used for increased securit

16.

Refer to the exhibit. Which encryption algorithm is described in the exhibit?


3DES
AES
DES
RC4
SEAL

17. An administrator requires a PKI that supports a longer lifetime for keys used for
digital signing operations than for keys used for encrypting data. Which feature
should the PKI support?
certificate keys
nonrepudiation keys
usage keys
variable keys

18. Which two statements correctly describe certificate classes used in the PKI?
(Choose two.)
A class 0 certificate is for testing purposes.
A class 0 certificate is more trusted than a class 1 certificate.
The lower the class number, the more trusted the certificate.
A class 5 certificate is for users with a focus on verification of email.
A class 4 certificate is for online business transactions between
between companies.

19. Two users must authenticate each other using digital certificates and a CA. Which
option describes the CA authentication procedure?
The CA is always required, even after user verification is complete.
The users must obtain the certificate of the CA and then their own certificate.
After user verification is complete, the CA is no longer required, even if one of
the involved certificates expires.
CA certificates are retrieved out-of-band
out band using the PSTN, and the authentication
is done in-band
band over a network.

20. Why is RSA typically used to protect only small amounts of data?
The keys must be a fixed length.
The public keys must be kept secret.
The algorithms used to encrypt data are slow.
The signature keys must be changed frequently.

21. Which algorithm would provide the best integrity check for data that is sent over the
Internet?
MD5
SHA-1
SHA-2
3DES

22. Which characteristic of security key management is responsible for making certain
that weak cryptographic keys are not used?
verification
exchange
generation
revocation and destruction

Anda mungkin juga menyukai