CCNA Security v2.0 Chapter 7 Simulator Exam Online
CCNA Security v2.0 Exam Training | |
---|---|
Time | 60 minutes |
Questions | 22 |
CCNA Security v2.0 Chapter 7 Simulator Exam
Time limit: 0
Quiz-summary
0 of 22 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
Information
CCNA Security v2.0 Chapter 7 Simulator Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 22 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
Your result has been entered into leaderboard
Loading
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- Answered
- Review
-
Question 1 of 22
1. Question
1 pointsWhat is the focus of cryptanalysis?
Correct
Incorrect
-
Question 2 of 22
2. Question
1 pointsHow many bits does the Data Encryption Standard (DES) use for data encryption?
Correct
Incorrect
-
Question 3 of 22
3. Question
1 pointsWhich statement describes the Software-Optimized Encryption Algorithm (SEAL)?
Correct
Incorrect
-
Question 4 of 22
4. Question
1 pointsWhich encryption algorithm is an asymmetric algorithm?
Correct
Incorrect
-
Question 5 of 22
5. Question
1 pointsAn online retailer needs a service to support the nonrepudiation of the transaction. Which component is used for this service?
Correct
Incorrect
-
Question 6 of 22
6. Question
1 pointsIn which situation is an asymmetric key algorithm used?
Correct
Incorrect
-
Question 7 of 22
7. Question
1 pointsWhat is the purpose of a nonrepudiation service in secure communications?
Correct
Incorrect
-
Question 8 of 22
8. Question
1 pointsWhich objective of secure communications is achieved by encrypting data?
Correct
Incorrect
-
Question 9 of 22
9. Question
1 pointsWhy is the 3DES algorithm often preferred over the AES algorithm?
Correct
Incorrect
-
Question 10 of 22
10. Question
1 pointsWhat is the most common use of the Diffie-Helman algorithm in communications security?
Correct
Incorrect
-
Question 11 of 22
11. Question
1 pointsWhich type of encryption algorithm uses public and private keys to provide authentication, integrity, and confidentiality?
Correct
Incorrect
-
Question 12 of 22
12. Question
1 pointsHow do modern cryptographers defend against brute-force attacks?
Correct
Incorrect
-
Question 13 of 22
13. Question
1 pointsWhich encryption protocol provides network layer confidentiality?
Correct
Incorrect
-
Question 14 of 22
14. Question
1 pointsRefer to the exhibit. Which encryption algorithm is described in the exhibit?
Correct
Incorrect
-
Question 15 of 22
15. Question
1 pointsWhich statement describes asymmetric encryption algorithms?
Correct
Incorrect
-
Question 16 of 22
16. Question
2 pointsWhich two non-secret numbers are initially agreed upon when the Diffie-Hellman algorithm is used? (Choose two.)
Correct
Incorrect
-
Question 17 of 22
17. Question
1 pointsIn what situation would an asymmetric algorithm most likely be used?
Correct
Incorrect
-
Question 18 of 22
18. Question
1 pointsWhy is asymmetric algorithm key management simpler than symmetric algorithm key management?
Correct
Incorrect
-
Question 19 of 22
19. Question
1 pointsWhat is the purpose of code signing?
Correct
Incorrect
-
Question 20 of 22
20. Question
1 pointsWhich algorithm can ensure data confidentiality?
Correct
Incorrect
-
Question 21 of 22
21. Question
1 pointsWhat is the purpose of a digital certificate?
Correct
Incorrect
-
Question 22 of 22
22. Question
1 pointsFill in the blank.
- A shared secret is a key used in a (symmetric, SYMMETRIC) encryption algorithm.
Correct
Incorrect
Leaderboard: CCNA Security v2.0 Chapter 7 Simulator Exam
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||