Beruflich Dokumente
Kultur Dokumente
NET
2. How many bits does the Data Encryption Standard (DES) use for data encryption?
40 bits
56 bits*
64 bits
72 bits
DH*
SEAL
3DES
AES
Shares
the unique shared secret known only by the retailer and the customer
An oce manager encrypts condential les before saving them to a removable device.
authentication
condentiality*
http://www.ccna5.net/ccnasecurityv20chapter7exam/3512 2/8
2017621 CCNASecurityv2.0Chapter7Exam|CCNA5.NET
availability
9. Why is the 3DES algorithm often preferred over the AES algorithm?
3DES is more trusted because it has been proven secure for a longer period than AES.*
Shares
AES is more expensive to implement than 3DES.
Major networking equipment vendors such as Cisco have not yet adopted AES.
10. What is the most common use of the Diffie-Helman algorithm in communications
security?
to create password hashes for secure authentication
11. Which type of encryption algorithm uses public and private keys to provide
authentication, integrity, and confidentiality?
symmetric
shared secret
IPsec
asymmetric*
Use a keyspace large enough that it takes too much money and too much time to conduct a
successful attack.*
Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successfu
attack.
http://www.ccna5.net/ccnasecurityv20chapter7exam/3512 3/8
2017621 CCNASecurityv2.0Chapter7Exam|CCNA5.NET
Use frequency analysis to ensure that the most popular letters used in the language are not used in the
cipher message.
Keyed MD5
Message Digest 5
14. Refer to the exhibit. Which encryption algorithm is described in the exhibit?
RC4
AES
3DES*
DES
SEAL
http://www.ccna5.net/ccnasecurityv20chapter7exam/3512 4/8
2017621 CCNASecurityv2.0Chapter7Exam|CCNA5.NET
They are relatively slow because they are based on dicult computational algorithms.*
16. Which two non-secret numbers are initially agreed upon when the Diffie-Hellman
algorithm is used? (Choose two.)
Shares
binomial coecient
generator*
prime modulus*
topological index
pseudorandom nome
http://www.ccna5.net/ccnasecurityv20chapter7exam/3512 5/8
2017621 CCNASecurityv2.0Chapter7Exam|CCNA5.NET
data encryption
PKI
RSA
AES*
It ensures that the person who is gaining access to a network device is authorized.
http://www.ccna5.net/ccnasecurityv20chapter7exam/3512 6/8
2017621 CCNASecurityv2.0Chapter7Exam|CCNA5.NET
Comments
Comment
Name
9 7 =
Add Comment
http://www.ccna5.net/ccnasecurityv20chapter7exam/3512 7/8
2017621 CCNASecurityv2.0Chapter7Exam|CCNA5.NET
CCNA5.NET =>
Shares
http://www.ccna5.net/ccnasecurityv20chapter7exam/3512 8/8