Time limit: 0
Quiz-summary
0 of 25 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
Information
CCNA Cyber Ops (Version 1.1) – Chapter 9 Test Online Full
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 25 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Answered
- Review
-
Question 1 of 25
1. Question
1 pointsWhich algorithm is used to automatically generate a shared secret for two systems to use in establishing an IPsec VPN?Correct
Incorrect
-
Question 2 of 25
2. Question
1 pointsA security specialist is tasked to ensure that files transmitted between the headquarters office and the branch office are not altered during transmission. Which two algorithms can be used to achieve this task? (Choose two.)Correct
Incorrect
-
Question 3 of 25
3. Question
1 pointsIn which way does the use of HTTPS increase the security monitoring challenges within enterprise networks?Correct
Incorrect
-
Question 4 of 25
4. Question
1 pointsWhat technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?Correct
Incorrect
-
Question 5 of 25
5. Question
1 pointsWhich three algorithms are designed to generate and verify digital signatures? (Choose three.)Correct
Incorrect
-
Question 6 of 25
6. Question
1 pointsWhat are two properties of a cryptographic hash function? (Choose two.)Correct
Incorrect
-
Question 7 of 25
7. Question
1 pointsWhich statement is a feature of HMAC?Correct
Incorrect
-
Question 8 of 25
8. Question
1 pointsWhich two statements describe the characteristics of symmetric algorithms? (Choose two.)Correct
Incorrect
-
Question 9 of 25
9. Question
1 pointsWhich encryption algorithm is an asymmetric algorithm?Correct
Incorrect
-
Question 10 of 25
10. Question
1 pointsWhich statement describes the use of certificate classes in the PKI?Correct
Incorrect
-
Question 11 of 25
11. Question
1 pointsWhat is the focus of cryptanalysis?Correct
Incorrect
-
Question 12 of 25
12. Question
1 pointsTwo users must authenticate each other using digital certificates and a CA. Which option describes the CA authentication procedure?Correct
Incorrect
-
Question 13 of 25
13. Question
1 pointsWhen implementing keys for authentication, if an old key length with 4 bits is increased to 8 bits, which statement describes the new key space?Correct
Incorrect
-
Question 14 of 25
14. Question
1 pointsWhat is the service framework that is needed to support large-scale public key-based technologies?Correct
Incorrect
-
Question 15 of 25
15. Question
1 pointsWhat are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)Correct
Incorrect
-
Question 16 of 25
16. Question
1 pointsA company is developing a security policy to ensure that OSPF routing updates are authenticated with a key. What can be used to achieve the task?Correct
Incorrect
-
Question 17 of 25
17. Question
1 pointsAn online retailer needs a service to support the nonrepudiation of the transaction. Which component is used for this service?Correct
Incorrect
-
Question 18 of 25
18. Question
1 pointsWhich statement describes the Software-Optimized Encryption Algorithm (SEAL)?Correct
Incorrect
-
Question 19 of 25
19. Question
1 pointsWhat role does an RA play in PKI?Correct
Incorrect
-
Question 20 of 25
20. Question
1 pointsWhat technology allows users to verify the identity of a website and to trust code that is downloaded from the Internet?Correct
Incorrect
-
Question 21 of 25
21. Question
1 pointsWhich three services are provided through digital signatures? (Choose three.)Correct
Incorrect
-
Question 22 of 25
22. Question
1 pointsWhat are two methods to maintain certificate revocation status? (Choose two.)Correct
Incorrect
-
Question 23 of 25
23. Question
1 pointsThe following message was encrypted using a Caesar cipher with a key of 2: fghgpf vjg ecuvng What is the plaintext message?Correct
Incorrect
-
Question 24 of 25
24. Question
1 pointsWhat is the purpose of a digital certificate?Correct
Incorrect
-
Question 25 of 25
25. Question
1 pointsA company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?Correct
Incorrect