CCNA Security Practice Test Results

Question 1
47% answer correctly
Which option is the term for the likelihood that a particular threat using a specific attack will exploit a particular vulnerability of a system that results in an undesirable consequence?
A vulnerability
An exploit
A risk
An attack
Question 2
68% answer correctly
Which option correctly defines asymmetric encryption?
Uses SHA-1 hashing algorithms for digital signage encryption
Uses MD5 hashing algorithms for digital signage encryption
Uses different keys to encrypt and decrypt data
Uses the same keys to encrypt and decrypt data
Question 3
36% answer correctly
Which of the following is true of an IDS?
Uses IP logging to send alerts
Implements blocking to stop an attacker
Only supports signatures to look for an attack
Uses inline mode