CCNA Security Practice Test Results

Question 1
47% answer correctly
Which option is the term for the likelihood that a particular threat using a specific attack will exploit a particular vulnerability of a system that results in an undesirable consequence?
A vulnerability
An attack
An exploit
A risk
Question 2
68% answer correctly
Which option correctly defines asymmetric encryption?
Uses different keys to encrypt and decrypt data
Uses SHA-1 hashing algorithms for digital signage encryption
Uses the same keys to encrypt and decrypt data
Uses MD5 hashing algorithms for digital signage encryption
Question 3
47% answer correctly
When implementing network security, what is an important configuration task that you should perform to assist in correlating network and security events?
Configure synchronized syslog reporting.
Configure an automated network monitoring system for event correlation.
Configure Network Time Protocol.
Configure a common repository of all network events for ease of monitoring.