CCNA Security Practice Test Results

Question 1
68% answer correctly
Which option correctly defines asymmetric encryption?
Uses MD5 hashing algorithms for digital signage encryption
Uses SHA-1 hashing algorithms for digital signage encryption
Uses the same keys to encrypt and decrypt data
Uses different keys to encrypt and decrypt data
Question 2
43% answer correctly
You have several operating groups in your enterprise that require differing access restrictions to the routers to perform their job roles. These groups range from Help Desk personnel to advanced troubleshooters. What is one methodology for controlling access rights to the routers in these situations?
Configure ACLs to control access for the different groups
Implement syslogging to monitor the activities of the groups
Configure multiple privilege level access
Configure TACACS+ to perform scalable authentication
Question 3
48% answer correctly
Which option is true of intrusion prevention systems?
They are more vulnerable to evasion techniques than IDS.
They operate in inline mode.
They have no potential impact on the data segment being monitored.
They operate in promiscuous mode.