CCNA Security Practice Test Results

Question 1
47% answer correctly
Which option is the term for the likelihood that a particular threat using a specific attack will exploit a particular vulnerability of a system that results in an undesirable consequence?
An attack
A risk
A vulnerability
An exploit
Question 2
68% answer correctly
Which option correctly defines asymmetric encryption?
Uses the same keys to encrypt and decrypt data
Uses SHA-1 hashing algorithms for digital signage encryption
Uses MD5 hashing algorithms for digital signage encryption
Uses different keys to encrypt and decrypt data
Question 3
47% answer correctly
When implementing network security, what is an important configuration task that you should perform to assist in correlating network and security events?
Configure a common repository of all network events for ease of monitoring.
Configure synchronized syslog reporting.
Configure Network Time Protocol.
Configure an automated network monitoring system for event correlation.