Take Assessment 7
Take Assessment 7
(Version 1.0)
T
5386991
o
p
Time Remaining:
o
f 01:29:47
F
o
r Bottom of Form
m
1 Top of Form
3DES
AES
DES
RC4
SEAL
Bottom of Form
2 Top of Form
What is a characteristic of the RSA algorithm?
RSA keys of 512 bits can be used for faster processing, while keys of 2048 bits can be used for increased security.
Bottom of Form
3 Top of Form
Which statement is a feature of HMAC?
HMAC uses a secret key that is only known to the sender and defeats man-in-the-middle attacks.
HMAC uses a secret key as input to the hash function, adding authentication to integrity assurance.
HMAC uses protocols such as SSL or TLS to provide session layer confidentiality.
Bottom of Form
4 Top of Form
An administrator requires a PKI that supports a longer lifetime for keys used for digital signing operations than for keys used for
encrypting data. Which feature should the PKI support?
certificate keys
nonrepudiation keys
usage keys
variable keys
Bottom of Form
5 Top of Form
Two users must authenticate each other using digital certificates and a CA. Which option describes the CA authentication procedur
The users must obtain the certificate of the CA and then their own certificate.
After user verification is complete, the CA is no longer required, even if one of the involved certificates expires.
CA certificates are retrieved out-of-band using the PSTN, and the authentication is done in-band over a network.
Bottom of Form
Close Window
Assessment System
T
5224353
o
p
Time Remaining:
o
f 01:27:05
F
o
r Bottom of Form
m
6 Top of Form
Which symmetrical encryption algorithm is the most difficult to crack?
3DES
AES
DES
RSA
SHA
Bottom of Form
7 Top of Form
Which two encryption algorithms are commonly used to encrypt the contents of a message? (Choose two.)
3DES
AES
IPsec
PKI
SHA1
Bottom of Form
8 Top of Form
stream cipher
substitution cipher
transposition cipher
Bottom of Form
9 Top of Form
Which statement describes the use of keys for encryption?
The sender and receiver must use the same key when using symmetric encryption.
The sender and receiver must use the same key when using asymmetric encryption.
The sender and receiver must use the same keys for both symmetric and asymmetric encryption.
The sender and receiver must use two keys: one for symmetric encryption and another for asymmetric encryption.
Bottom of Form
10 Top of Form
What does it mean when a hashing algorithm is collision resistant?
It uses a two-way function that computes a hash from the input and output data.
Bottom of Form
Top of Form
2
Showing 2 of 5 <Prev Next>
Page:
Bottom of Form
Close Window
All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
2
Close Window
Assessment System
T
5091177
o
p
Time Remaining:
o
f 01:24:52
F
o
r Bottom of Form
m
11 Top of Form
Which three primary functions are required to secure communication across network links? (Choose three.)
accounting
anti-replay protection
authentication
authorization
confidentiality
integrity
Bottom of Form
12 Top of Form
Why is RSA typically used to protect only small amounts of data?
Bottom of Form
13 Top of Form
Which statement describes asymmetric encryption algorithms?
They are relatively slow because they are based on difficult computational algorithms.
Bottom of Form
14 Top of Form
What is the basic method used by 3DES to encrypt plaintext?
The data is encrypted, decrypted, and encrypted using three different keys.
The data is divided into three blocks of equal length for encryption.
The data is encrypted using a key length that is three times longer than the key used for DES.
Bottom of Form
15 Top of Form
Which algorithm would provide the best integrity check for data that is sent over the Internet?
MD5
SHA-1
SHA-2
3DES
Bottom of Form
Top of Form
3
Showing 3 of 5 <Prev Next>
Page:
Bottom of Form
Close Window
All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
3
Close Window
Assessment System
1. Assessment 2. Assessment 3. Take
Selection Settings Assessment
T
2566139
o
p
Time Remaining:
o
f 00:42:47
F
o
r Bottom of Form
m
16 Top of Form
How do modern cryptographers defend against brute-force attacks?
Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successful attack.
Use a keyspace large enough that it takes too much money and too much time to conduct a successful attack.
Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message.
Bottom of Form
17 Top of Form
Which two statements correctly describe certificate classes used in the PKI? (Choose two.)
The lower the class number, the more trusted the certificate.
18 Top of Form
Which encryption protocol provides network layer confidentiality?
Keyed MD5
Message Digest 5
Bottom of Form
19 Top of Form
Which characteristic of security key management is responsible for making certain that weak cryptographic keys are not used?
verification
exchange
generation
Bottom of Form
20 Top of Form
A customer purchases an item from an e-commerce site. The e-commerce site must maintain proof that the data exchange took pla
between the site and the customer. Which feature of digital signatures is required?
Bottom of Form
Top of Form
4
Showing 4 of 5 <Prev Next>
Page:
Bottom of Form
Close Window
All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
4
Close Window
Assessment System
1915942
T
o Time Remaining:
p 00:31:56
o
f
F Bottom of Form
o
r
m
21 Top of Form
Which statement describes a cryptographic hash function?
Bottom of Form
22 Top of Form
The network administrator for an e-commerce website requires a service that prevents customers from claiming that legitimate orde
are fake. What service provides this type of guarantee?
authentication
confidentiality
integrity
nonrepudiation
Bottom of Form
Top of Form
5
Showing 5 of 5 <Prev Next>
Page:
Bottom of Form
Close Window
All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
5
Bottom of Form
Bottom of Form
Bottom of Form
Bottom of Form