CCNA Security Practice Test Results

Question 1
31% answer correctly
Which option is a desirable feature of using symmetric encryption algorithms?
They offer simple key management properties.
They are based on complex mathematical operations and can easily be accelerated by hardware.
They are often used for wire-speed encryption in data networks.
They are best used for one-time encryption needs.
Question 2
44% answer correctly
Which option is true of using cryptographic hashes?
They are easily reversed to decipher the message context.
They convert arbitrary data into a fixed-length digest.
They are used for encrypting bulk data communications.
They are based on a two-way mathematical function.
Question 3
68% answer correctly
Which option correctly defines asymmetric encryption?
Uses different keys to encrypt and decrypt data
Uses SHA-1 hashing algorithms for digital signage encryption
Uses the same keys to encrypt and decrypt data
Uses MD5 hashing algorithms for digital signage encryption