Time limit: 0
Quiz-summary
0 of 38 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
Information
CCNA Cyber Ops (Version 1.1) – Chapter 9 Test Online Full
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 38 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- Answered
- Review
-
Question 1 of 38
1. Question
1 pointsWhich algorithm is used to automatically generate a shared secret for two systems to use in establishing an IPsec VPN?Correct
Incorrect
-
Question 2 of 38
2. Question
1 pointsA security specialist is tasked to ensure that files transmitted between the headquarters office and the branch office are not altered during transmission. Which two algorithms can be used to achieve this task? (Choose two.)Correct
Incorrect
-
Question 3 of 38
3. Question
1 pointsIn which way does the use of HTTPS increase the security monitoring challenges within enterprise networks?Correct
Incorrect
-
Question 4 of 38
4. Question
1 pointsWhat technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative identity?Correct
Incorrect
-
Question 5 of 38
5. Question
1 pointsWhich three algorithms are designed to generate and verify digital signatures? (Choose three.)Correct
Incorrect
-
Question 6 of 38
6. Question
1 pointsWhat are two properties of a cryptographic hash function? (Choose two.)Correct
Incorrect
-
Question 7 of 38
7. Question
1 pointsWhich statement is a feature of HMAC?Correct
Incorrect
-
Question 8 of 38
8. Question
1 pointsWhich two statements describe the characteristics of symmetric algorithms? (Choose two.)Correct
Incorrect
-
Question 9 of 38
9. Question
1 pointsWhich encryption algorithm is an asymmetric algorithm?Correct
Incorrect
-
Question 10 of 38
10. Question
1 pointsWhich statement describes the use of certificate classes in the PKI?Correct
Incorrect
-
Question 11 of 38
11. Question
1 pointsWhat is the focus of cryptanalysis?Correct
Incorrect
-
Question 12 of 38
12. Question
1 pointsTwo users must authenticate each other using digital certificates and a CA. Which option describes the CA authentication procedure?Correct
Incorrect
-
Question 13 of 38
13. Question
1 pointsWhen implementing keys for authentication, if an old key length with 4 bits is increased to 8 bits, which statement describes the new key space?Correct
Incorrect
-
Question 14 of 38
14. Question
1 pointsWhat is the service framework that is needed to support large-scale public key-based technologies?Correct
Incorrect
-
Question 15 of 38
15. Question
1 pointsWhat are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)Correct
Incorrect
-
Question 16 of 38
16. Question
1 pointsA company is developing a security policy to ensure that OSPF routing updates are authenticated with a key. What can be used to achieve the task?Correct
Incorrect
-
Question 17 of 38
17. Question
1 pointsAn online retailer needs a service to support the nonrepudiation of the transaction. Which component is used for this service?Correct
Incorrect
-
Question 18 of 38
18. Question
1 pointsWhich statement describes the Software-Optimized Encryption Algorithm (SEAL)?Correct
Incorrect
-
Question 19 of 38
19. Question
1 pointsWhat role does an RA play in PKI?Correct
Incorrect
-
Question 20 of 38
20. Question
1 pointsWhat technology allows users to verify the identity of a website and to trust code that is downloaded from the Internet?Correct
Incorrect
-
Question 21 of 38
21. Question
1 pointsWhich three services are provided through digital signatures? (Choose three.)Correct
Incorrect
-
Question 22 of 38
22. Question
1 pointsWhat are two methods to maintain certificate revocation status? (Choose two.)Correct
Incorrect
-
Question 23 of 38
23. Question
1 pointsThe following message was encrypted using a Caesar cipher with a key of 2: fghgpf vjg ecuvng What is the plaintext message?Correct
Incorrect
-
Question 24 of 38
24. Question
1 pointsWhat is the purpose of a digital certificate?Correct
Incorrect
-
Question 25 of 38
25. Question
1 pointsA company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?Correct
Incorrect
-
Question 26 of 38
26. Question
1 pointsIf an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?Correct
Incorrect
-
Question 27 of 38
27. Question
1 pointsWhich type of attack does the use of HMACs protect against?Correct
Incorrect
-
Question 28 of 38
28. Question
1 pointsWhich algorithm can ensure data confidentiality?Correct
Incorrect
-
Question 29 of 38
29. Question
1 pointsWhat is the purpose of code signing?Correct
Incorrect
-
Question 30 of 38
30. Question
1 pointsWhat are two symmetric encryption algorithms? (Choose two.)Correct
Incorrect
-
Question 31 of 38
31. Question
1 pointsWhat is the purpose of the DH algorithm?Correct
Incorrect
-
Question 32 of 38
32. Question
1 pointsWhich cryptographic technique provides both data integrity and nonrepudiation?Correct
Incorrect
-
Question 33 of 38
33. Question
1 pointsIn a hierarchical CA topology, where can a subordinate CA obtain a certificate for itself?Correct
Incorrect
-
Question 34 of 38
34. Question
1 pointsWhich objective of secure communications is achieved by encrypting data?Correct
Incorrect
-
Question 35 of 38
35. Question
1 pointsWhich statement describes the use of hashing?Correct
Incorrect
-
Question 36 of 38
36. Question
1 pointsWhich IETF standard defines the PKI digital certificate format?Correct
Incorrect
-
Question 37 of 38
37. Question
1 pointsWhich two statements correctly describe certificate classes used in the PKI? (Choose two.)Correct
Incorrect
-
Question 38 of 38
38. Question
1 pointsAlice and Bob want to use a CA authentication procedure to authenticate each other. What must be obtained first?Correct
Incorrect