CCNA Security Practice Test Results

Question 1
31% answer correctly
Which option is a desirable feature of using symmetric encryption algorithms?
They offer simple key management properties.
They are best used for one-time encryption needs.
They are often used for wire-speed encryption in data networks.
They are based on complex mathematical operations and can easily be accelerated by hardware.
Question 2
23% answer correctly
Which access list permits HTTP traffic sourced from host 10.1.129.100 port 3030 destined to host 192.168.1.10?
access-list 101 permit tcp 10.1.128.0 0.0.1.255 eq 3030 192.168.1.0 0.0.0.15 eq www
access-list 101 permit ip host 10.1.129.100 eq 3030 host 192.168.1.100 eq 80
access-list 101 permit tcp 192.168.1.10 0.0.0.0 eq 80 10.1.0.0 0.0.255.255
access-list 101 permit tcp any eq 3030
access-list 101 permit tcp host 192.168.1.10 eq 80 10.1.0.0 0.0.255.255 eq 3030
access-list 101 permit tcp 10.1.129.0 0.0.0.255 eq www 192.168.1.10 0.0.0.0 eq www
Question 3
48% answer correctly
Which option is true of intrusion prevention systems?
They are more vulnerable to evasion techniques than IDS.
They operate in promiscuous mode.
They have no potential impact on the data segment being monitored.
They operate in inline mode.