Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
263Activity
0 of .
Results for:
No results containing your search query
P. 1
CCNA Security Module 7

CCNA Security Module 7

Ratings: (0)|Views: 10,868 |Likes:
Published by Akbal Larios

More info:

Published by: Akbal Larios on Nov 08, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

07/19/2013

pdf

text

original

 
CCNAS Module 7
1
Which three primary functions are required to secure communication across network links?(Choose three.)accountinganti-replay protectionauthenticationauthorizationconfidentialityintegrity
2
Which two encryption algorithms are commonly used to encrypt the contents of a message?(Choose two.)3DESAESIPsecPKISHA1
3
An administrator requires a PKI that supports a longer lifetime for keys used for digital signingoperations than for keys used for encrypting data. Which feature should the PKI support?certificate keysnonrepudiation keysusage keysvariable keys
4
Two users must authenticate each other using digital certificates and a CA. Which option describes theCA authentication procedure?The CA is always required, even after user verification is complete.The users must obtain the certificate of the CA and then their own certificate.After user verification is complete, the CA is no longer required, even if one of the involved certificaexpires.CA certificates are retrieved out-of-band using the PSTN, and the authentication is done in-band ovenetwork.
5
A customer purchases an item from an e-commerce site. The e-commerce site must maintain proof thatthe data exchange took place between the site and the customer. Which feature of digital signatures isrequired?
 
authenticity of digitally signed dataintegrity of digitally signed datanonrepudiation of the transactionconfidentiality of the public key
6
What is the basic method used by 3DES to encrypt plaintext?The data is encrypted three times with three different keys.The data is encrypted, decrypted, and encrypted using three different keys.The data is divided into three blocks of equal length for encryption.The data is encrypted using a key length that is three times longer than the key used for DES.
7
Which statement describes a cryptographic hash function?A one-way cryptographic hash function is hard to invert.The output of a cryptographic hash function can be any length.The input of a cryptographic hash function has a fixed length.A cryptographic hash function is used to provide confidentiality.
8
Which statement is a feature of HMAC?HMAC is based on the RSA hash function.HMAC uses a secret key that is only known to the sender and defeats man-in-the-middle attacks.HMAC uses a secret key as input to the hash function, adding authentication to integrity assurance.HMAC uses protocols such as SSL or TLS to provide session layer confidentiality.
9
Why is RSA typically used to protect only small amounts of data?The keys must be a fixed length.The public keys must be kept secret.The algorithms used to encrypt data are slow.The signature keys must be changed frequently.
The network administrator for an e-commerce website requires a service that prevents customers fromclaiming that legitimate orders are fake. What service provides this type of guarantee?authenticationconfidentialityintegritynonrepudiation
 
Refer to the exhibit. Which encryption algorithm is described in the exhibit?3DESAESDESRC4SEAL
Which statement describes asymmetric encryption algorithms?They include DES, 3DES, and AES.They have key lengths ranging from 80 to 256 bits.They are also called shared-secret key algorithms.They are relatively slow because they are based on difficult computational algorithms.
Which symmetrical encryption algorithm is the most difficult to crack?3DESAESDESRSASHA
What is a characteristic of the RSA algorithm?RSA is much faster than DES.RSA is a common symmetric algorithm.RSA is used to protect corporate data in high-throughput, low-latency environments.RSA keys of 512 bits can be used for faster processing, while keys of 2048 bits can be used for increased security.

Activity (263)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Juan Diego Ossa liked this
sccdare18 liked this
Sohail Iqbal liked this
Tauelagi Kengike liked this
Rio Tsai liked this
Mary Lorz liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->