CCNA Security Practice Test Results

Question 1
31% answer correctly
Which option is a desirable feature of using symmetric encryption algorithms?
They are best used for one-time encryption needs.
They are based on complex mathematical operations and can easily be accelerated by hardware.
They are often used for wire-speed encryption in data networks.
They offer simple key management properties.
Question 2
44% answer correctly
Which option is true of using cryptographic hashes?
They are based on a two-way mathematical function.
They are easily reversed to decipher the message context.
They are used for encrypting bulk data communications.
They convert arbitrary data into a fixed-length digest.
Question 3
48% answer correctly
Which option is true of intrusion prevention systems?
They have no potential impact on the data segment being monitored.
They are more vulnerable to evasion techniques than IDS.
They operate in promiscuous mode.
They operate in inline mode.