CCNA Security Practice Test Results

Question 1
47% answer correctly
Which option is the term for the likelihood that a particular threat using a specific attack will exploit a particular vulnerability of a system that results in an undesirable consequence?
An exploit
A vulnerability
A risk
An attack
Question 2
68% answer correctly
Which option correctly defines asymmetric encryption?
Uses the same keys to encrypt and decrypt data
Uses different keys to encrypt and decrypt data
Uses SHA-1 hashing algorithms for digital signage encryption
Uses MD5 hashing algorithms for digital signage encryption
Question 3
48% answer correctly
Which option is true of intrusion prevention systems?
They operate in promiscuous mode.
They are more vulnerable to evasion techniques than IDS.
They have no potential impact on the data segment being monitored.
They operate in inline mode.