CCNA Security Practice Test Results

Question 1
31% answer correctly
Which option is a desirable feature of using symmetric encryption algorithms?
They are based on complex mathematical operations and can easily be accelerated by hardware.
They are best used for one-time encryption needs.
They offer simple key management properties.
They are often used for wire-speed encryption in data networks.
Question 2
44% answer correctly
Which option is true of using cryptographic hashes?
They convert arbitrary data into a fixed-length digest.
They are easily reversed to decipher the message context.
They are based on a two-way mathematical function.
They are used for encrypting bulk data communications.
Question 3
36% answer correctly
Which of the following is true of an IDS?
Uses inline mode
Uses IP logging to send alerts
Implements blocking to stop an attacker
Only supports signatures to look for an attack