answer ccna security chapter 7 test – ccnas v1.1 _ invisible algorithm
Post on 28-Apr-2015
1.432 Views
Preview:
TRANSCRIPT
Answer CCNA Security Chapter 7 Test CCNAS v1.1 | Invisible Algorithm
Home
Category
Search
Sitemap
Contact Us
About
VMware Courses-Free ExamsVMware and Zimbra training courses Register today and become a VCPwww.alfavad.com
Answer CCNA Security Chapter 7 Test CCNAS v1.1Posted on August 5, 2012
RECENTLY WRI TTEN
Disable w3 Total Cache Plugin Completely Unable to Connect to Internet Eset Smart Security Atheros AR5007EG Windows 7 Driver Network Security Chapter 4 Packet Tracer Activity A Answer Answer CCNA Security Chapter 10 Test CCNAS v1.1
X.25 Network ConversionBest Value for X.25-TCP/IP Gateways Supports XOT, SVC, PVC, SNMP & LAPBwww.microtronix.com
Phishing Alert ServiceFree with all GlobalSign SSL Certificateswww.GlobalSign.eu/ssl/
Winter Programme on UNGeneva Winter Programme on the UN and PublicPrivate Cooperation.graduateinstitute.ch/winter COFFEE FOR ME
CCNA Exam Simulator300+ challenging CCNA Questions Only $19.95 or Try it Freewww.MyPowerPass.com/ SEARCH
This post is regarding Answer for CCNA Security Chapter 7 Test. All the questions published here is based on CCNAS v1.1. All the answers provided here has been proven to be 100% correct.
Search
http://www.invialgo.com/2012/answer-ccna-security-chapter-7-test-ccnas-v1-1/[11/1/2012 1:20:04 AM]
Answer CCNA Security Chapter 7 Test CCNAS v1.1 | Invisible Algorithm
Hopefully, it will be a good material for our reference in Network Security.Login
Invisible Algorithm
The network administrator for an e-commerce website requires a service that prevents customers from claiming that legitimate orders are fake. What service provides this type of guarantee? authentication confidentiality integrity nonrepudiation
on Facebook Like
105 people likeFacebook social plugin
Follow
+6
How do modern cryptographers defend against brute-force attacks? Use statistical analysis to eliminate the most common encryption keys. Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successful attack. Use a keyspace large enough that it takes too much money and too much time to conduct a successful attack. Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message.
Find us on Google+
What is the basic method used by 3DES to encrypt plaintext? The data is encrypted three times with three different keys. The data is encrypted, decrypted, and encrypted using three different keys. The data is divided into three blocks of equal length for encryption.CCNA SECURI TY
Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5
http://www.invialgo.com/2012/answer-ccna-security-chapter-7-test-ccnas-v1-1/[11/1/2012 1:20:04 AM]
Answer CCNA Security Chapter 7 Test CCNAS v1.1 | Invisible Algorithm
Chapter 6
The data is encrypted using a key length that is three times longer than the key used for DES.
Chapter 7 Chapter 8 Chapter 9 Chapter 10 Final Exam
A customer purchases an item from an e-commerce site. The ecommerce site must maintain proof that the data exchange took place between the site and the customer. Which feature of digital signatures is required? authenticity of digitally signed data integrity of digitally signed data nonrepudiation of the transaction confidentiality of the public key
Why is RSA typically used to protect only small amounts of data? The keys must be a fixed length. The public keys must be kept secret. The algorithms used to encrypt data are slow. The signature keys must be changed frequently.
An administrator requires a PKI that supports a longer lifetime for keys used for digital signing operations than for keys used for encrypting data. Which feature should the PKI support? certificate keys nonrepudiation keys usage keys variable keys
RANDOM TERMS
android host name ndern ccna security 1 1 exam chapter 3 What is the name of the virus planted on computers and then activated on a given date? flashtool - xperia devices flashing closing code matlab
http://www.invialgo.com/2012/answer-ccna-security-chapter-7-test-ccnas-v1-1/[11/1/2012 1:20:04 AM]
Answer CCNA Security Chapter 7 Test CCNAS v1.1 | Invisible Algorithm
Which
three
primary
functions
are
required
to secure
communication across network links? (Choose three.) accounting anti-replay protection authentication authorization confidentiality integrity
Refer to the exhibit. Which type of cipher method is depicted? Caesar cipher stream cipher substitution cipher transposition cipher
Which statement describes a cryptographic hash function? A one-way cryptographic hash function is hard to invert.http://www.invialgo.com/2012/answer-ccna-security-chapter-7-test-ccnas-v1-1/[11/1/2012 1:20:04 AM]
Answer CCNA Security Chapter 7 Test CCNAS v1.1 | Invisible Algorithm
The output of a cryptographic hash function can be any length. The input of a cryptographic hash function has a fixed length. A cryptographic hash function is used to provide confidentiality.
Which statement is a feature of HMAC? HMAC is based on the RSA hash function. HMAC uses a secret key that is only known to the sender and defeats man-in-the-middle attacks. HMAC uses a secret key as input to the hash function, adding authentication to integrity assurance. HMAC uses protocols such as SSL or TLS to provide session layer confidentiality.
Which encryption protocol provides network layer confidentiality? IPsec protocol suite Keyed MD5 Message Digest 5 Secure Sockets Layer Secure Hash Algorithm 1 Transport Layer Security
http://www.invialgo.com/2012/answer-ccna-security-chapter-7-test-ccnas-v1-1/[11/1/2012 1:20:04 AM]
Answer CCNA Security Chapter 7 Test CCNAS v1.1 | Invisible Algorithm
Refer to the exhibit. Which encryption algorithm is described in the exhibit? 3DES AES DES RC4 SEAL
Which statement describes asymmetric encryption algorithms? They include DES, 3DES, and AES. They have key lengths ranging from 80 to 256 bits. They are also called shared-secret key algorithms. They are relatively slow because they are based on difficult computational algorithms.
Which two statements correctly describe certificate classes used in the PKI? (Choose two.) A class 0 certificate is for testing purposes. A class 0 certificate is more trusted than a class 1 certificate. The lower the class number, the more trusted the certificate. A class 5 certificate is for users with a focus on verification of email.http://www.invialgo.com/2012/answer-ccna-security-chapter-7-test-ccnas-v1-1/[11/1/2012 1:20:04 AM]
Answer CCNA Security Chapter 7 Test CCNAS v1.1 | Invisible Algorithm
A class 4 certificate is for online business transactions between companies.
Two users must authenticate each other using digital certificates and a CA. Which option describes the CA authentication procedure? The CA is always required, even after user verification is complete. The users must obtain the certificate of the CA and then their own certificate. After user verification is complete, the CA is no longer required, even if one of the involved certificates expires. CA certificates are retrieved out-of-band using the PSTN, and the authentication is done in-band over a network.
Which characteristic of security key management is responsible for making certain that weak cryptographic keys are not used? verification exchange generation revocation and destruction
Which type of cryptographic key would be used when connecting to a secure website? DES key symmetric keys hash keys
http://www.invialgo.com/2012/answer-ccna-security-chapter-7-test-ccnas-v1-1/[11/1/2012 1:20:04 AM]
Answer CCNA Security Chapter 7 Test CCNAS v1.1 | Invisible Algorithm
digital signatures
Which algorithm is used to automatically generate a shared secret for two systems to use in establishing an IPsec VPN? ESP DES 3DES AH DH SSL
Which two non-secret numbers are initially agreed upon when the Diffie-Hellman algorithm is used? (Choose two.) elliptic curve invariant generator pseudorandom nome binomial coefficient prime modulus topological index
What does it mean when a hashing algorithm is collision resistant? Exclusive ORs are performed on input data and produce a digest. It is not feasible to compute the hash given the input data. It uses a two-way function that computes a hash from the input
http://www.invialgo.com/2012/answer-ccna-security-chapter-7-test-ccnas-v1-1/[11/1/2012 1:20:04 AM]
Answer CCNA Security Chapter 7 Test CCNAS v1.1 | Invisible Algorithm
and output data. Two messages with the same hash are unlikely to occur.
I did mentioned above that all the answers for CCNA Security Chapter 7 are 100% correct. However, if you find any mistake or error, please do comment below to share with us the correct answer. We also do appreciate any latest version or new questions that you would like to share with us. Credit: The answers for this CCNA Security Chapter 7 Test provided by Xase. All credit goes to him.
Virus Protection
Business Opportunities
Accounting Degree
This entry was posted in Data Network, Network Security and tagged 2012, Answer, CCNA Security, CCNA Security Chapter 7 Answer, CCNA Security Chapter 7 Test, CCNAS Chapter 7 Test, CCNAS v1.1, Chapter 7 Test, Solution, Solution CCNA Security Chapter 7 by InviAlgo. Bookmark the permalink.
ONE THOUGHT ON ANSWER CCNA SECURITY CHAPTER 7 TEST CCNAS V1.1
emanuel on August 9, 2012 at 10:43 PM said:
GRACIAS! .Reply
Leave a ReplyYour email address will not be published. Required fields are marked *
Name
*
*
http://www.invialgo.com/2012/answer-ccna-security-chapter-7-test-ccnas-v1-1/[11/1/2012 1:20:04 AM]
Answer CCNA Security Chapter 7 Test CCNAS v1.1 | Invisible Algorithm
Website
Comment
All All
Post Comment
Notify me of followup comments via e-mail. You can also subscribe without commenting.
Search Invisible Algorithm: ccna security chapter 4 exam answers 100, which algorithm is used to automatically generate a shared secret for two systems to use in establishing an ipsec vpn?, which two non-secret numbers are initially agreed upon when the diffie-hellman algorithm is used? (choose two ), which algorithm is used to automatically generate a shared secret for two systems to use in establishing an ipsec vpn, ccna security answers v1 1, anti-replay service, ccnas v1 1 chapter 7, ccna security chapter 7 exam 1 1, which two non-secret numbers are intially agreed upon when the, ccnas Which algorithm is used to automatically generate a shared secret for two systems to use in establishing an IPsec VPN?
http://www.invialgo.com/2012/answer-ccna-security-chapter-7-test-ccnas-v1-1/[11/1/2012 1:20:04 AM]
top related