What are the two modes used in IKE Phase 1? (Choose two.)
What are the two modes used in IKE Phase 1? (Choose two.) aggressive main passive primary secondary Answers Explanation & Hints: The two modes for IKE Phase 1 are main…
What are the two modes used in IKE Phase 1? (Choose two.) aggressive main passive primary secondary Answers Explanation & Hints: The two modes for IKE Phase 1 are main…
What technology is used to negotiate security associations and calculate shared keys for an IPsec VPN tunnel? 3DES IKE PSK SHA Answers Explanation & Hints: The Internet Key Exchange (IKE)…
Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key? The length of a key will not vary between encryption algorithms. The…
Two corporations have just completed a merger. The network engineer has been asked to connect the two corporate networks without the expense of leased lines. Which solution would be the…
Which two statements describe a remote access VPN? (Choose two.) It connects entire networks to each other. It requires hosts to send TCP/IP traffic through a VPN gateway. It is…
Two users must authenticate each other using digital certificates and a CA. Which option describes the CA authentication procedure? The CA is always required, even after user verification is complete.…
Which three security services are provided by digital signatures? (Choose three.) authenticates the source authenticates the destination guarantees data has not changed in transit provides data encryption provides nonrepudiation using…
Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document…
What technology supports asymmetric key encryption used in IPsec VPNs? 3DES IKE SEAL AES Answers Explanation & Hints: IKE, or Internet Key Exchange, is a protocol to support asymmetric encryption…
Which statement describes asymmetric encryption algorithms? They include DES, 3DES, and AES. They have key lengths ranging from 80 to 256 bits. They are also called shared-secret key algorithms. They…
What are two symmetric encryption algorithms? (Choose two.) 3DES MD5 AES HMAC SHA Answers Explanation & Hints: MD5, HMAC, and SHA are hashing algorithms.
What is the keyspace of an encryption algorithm? the mathematical equation that is used to create a key the set of all possible values used to generate a key the…
Which algorithm can ensure data integrity? MD5 AES RSA PKI Answers Explanation & Hints: Data integrity guarantees that the message was not altered in transit. Integrity is ensured by implementing…
Match the disciplines or roles to the descriptions.
In which method used in cryptanalysis does the attacker know a portion of the plaintext and the corresponding ciphertext? brute-force ciphertext chosen-plaintext meet-in-the-middle Answers Explanation & Hints: There are several…
What is an example of the one-time pad cipher? RC4 rail fence Caesar Vigenère Answers Explanation & Hints: RC4 is an example of the one-time pad cipher, and it is…
The following message was encrypted using a Caesar cipher with a key of 2: fghgpf vjg ecuvng What is the plaintext message? defend the region invade the castle defend the…
What popular encryption algorithm requires that both the sender and receiver know a pre-shared key? PKI MD5 HMAC AES Answers Explanation & Hints: MD5 is a hashing algorithm that guarantees…
What is another name for confidentiality of information? privacy accuracy consistency trustworthiness Answers Explanation & Hints: Privacy is another name for confidentiality. Accuracy, consistency, and trustworthiness describe integrity of data.
A network administrator uses the spanning-tree loopguard default global configuration command to enable Loop Guard on switches. What components in a LAN are protected with Loop Guard? All PortFast enabled…