ch 7 cisco firewalls
What are two symmetric encryption algorithms? (Choose two.)
3DES AES
Which two statements correctly describe certificate classes used in the PKI? (Choose two.)
A class 0 certificate is for testing purposes. A class 4 certificate is for online business transactions between companies.
A network administrator is forced to use DES on aging equipment. What is one thing the administrator should do in this situation?
Implement CBC mode
What is the service framework that is needed to support large-scale public key-based technologies?
PKI
What is a difference between symmetric and asymmetric encryption algorithms? a. Symmetric algorithms are typically hundreds to thousands of times slower than asymmetric algorithms. b. Symmetric encryption algorithms are used to authenticate secure communications. Asymmetric encryption algorithms are used to repudiate messages. c. Symmetric encryption algorithms are used to encrypt data. Asymmetric encryption algorithms are used to decrypt data. d. Symmetric encryption algorithms use pre-shared keys. Asymmetric encryption algorithms use different keys to encrypt and decrypt data.
Symmetric encryption algorithms use pre-shared keys. Asymmetric encryption algorithms use different keys to encrypt and decrypt data.
If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?
a private key
What are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)
certificate authority digital certificates
The following message was encrypted using a Caesar cipher with a key of 2:
defend the castle
Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?
integrity
Which type of attack does the use of HMACs protect against?
man-in-the-middle
What is the purpose of the DH algorithm?
to generate a shared secret between two hosts that have not communicated before
What is the reason for HMAC to use an additional secret key as input to the hash function?
to provide authentication