ch 7 cisco firewalls

Ace your homework & exams now with Quizwiz!

What are two symmetric encryption algorithms? (Choose two.)

3DES AES

Which two statements correctly describe certificate classes used in the PKI? (Choose two.)

A class 0 certificate is for testing purposes. A class 4 certificate is for online business transactions between companies.

A network administrator is forced to use DES on aging equipment. What is one thing the administrator should do in this situation?

Implement CBC mode

What is the service framework that is needed to support large-scale public key-based technologies?

PKI

What is a difference between symmetric and asymmetric encryption algorithms? a. Symmetric algorithms are typically hundreds to thousands of times slower than asymmetric algorithms. b. Symmetric encryption algorithms are used to authenticate secure communications. Asymmetric encryption algorithms are used to repudiate messages. c. Symmetric encryption algorithms are used to encrypt data. Asymmetric encryption algorithms are used to decrypt data. d. Symmetric encryption algorithms use pre-shared keys. Asymmetric encryption algorithms use different keys to encrypt and decrypt data.

Symmetric encryption algorithms use pre-shared keys. Asymmetric encryption algorithms use different keys to encrypt and decrypt data.

If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?

a private key

What are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)

certificate authority digital certificates

The following message was encrypted using a Caesar cipher with a key of 2:

defend the castle

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

integrity

Which type of attack does the use of HMACs protect against?

man-in-the-middle

What is the purpose of the DH algorithm?

to generate a shared secret between two hosts that have not communicated before

What is the reason for HMAC to use an additional secret key as input to the hash function?

to provide authentication


Related study sets

Pentathlon Social Science Section 3 & 4

View Set

PREP U Chapter 10: Nursing Management: Patients With Chest and Lower Respiratory Tract Disorders

View Set

Quiz 1: Weather Factors of the Sky

View Set

SCI 2020 Chapter 14 Midterm Study Guide

View Set

Sect. 4.11 - Managing Headers, Footers, and Sections

View Set

Junior Words Unit 5 Synonyms and Antonyms

View Set