CCNA Security Practice Test Results

Question 1
68% answer correctly
Which option correctly defines asymmetric encryption?
Uses the same keys to encrypt and decrypt data
Uses MD5 hashing algorithms for digital signage encryption
Uses different keys to encrypt and decrypt data
Uses SHA-1 hashing algorithms for digital signage encryption
Question 2
55% answer correctly
Which statement is true when using zone-based firewalls on a Cisco router?
When configured with the "PASS" action, stateful inspection is applied to all traffic passing between the configured zones.
Interface ACLs are applied before zone-based policy firewalls when they are applied outbound.
The firewalls can be configured simultaneously on the same interface as classic CBAC using the ip inspect CLI command.
Policies are applied to traffic moving between zones, not between interfaces.
Question 3
47% answer correctly
When implementing network security, what is an important configuration task that you should perform to assist in correlating network and security events?
Configure Network Time Protocol.
Configure a common repository of all network events for ease of monitoring.
Configure synchronized syslog reporting.
Configure an automated network monitoring system for event correlation.