This CCNA Cyber Ops (210-250 SECFND) quiz assesses knowledge on cryptography, SSL\/TLS communications, cipher types, hash algorithms, and data integrity. It prepares learners for handling security protocols and understanding potential vulnerabilities in network security.
UDP port 67 and UDP port 68
TCP port 21 and TCP port 22
TCP port 53 and UDP port 53
TCP 161 and UDP 161
Rate this question:
443
8080
80
22
Rate this question:
Asymmetric encryption algorithm
Symmetric encryption algorithm
Dodecaphonic algorithm
Diffie-Hellman algorithm
Rate this question:
Cipher text
Asymmetric encryption
Symmetric encryption
Avalanche effect
Rate this question:
Asymmetric encryption algorithm
Dodecaphonic algorithm
Diffie-Hellman algorithm
Symmetric encryption algorithm
Rate this question:
80 bits
41 bits
120 bits
160 bits
Rate this question:
Cost of security solution
Threat
Deployment time
Impact
Support costs
Vulnerabilities
Rate this question:
Asymmetric algorithms are substantially slower than symmetric algorithms.
Asymmetric algorithms are easier to break than symmetric algorithms.
Symmetric algorithms can provide authentication and confidentiality.
Symmetric algorithms use a much larger key size.
Rate this question:
An attacker's attempt to decode a cipher by attempting each possible key combination to find the correct one
Breaking and entering into a physical building or network closet
A rogue DHCP server that is posing as a legitimate DHCP server on a network segment
An attacker inserting itself between two devices in a communication session and then taking over the session.
Rate this question:
Domain shadowing provides a backup web site to redirect the user to, in the event of a compromise.
Domain shadowing involves the attacker compromising a parent domain and creating multiple subdomains to be used during their attacks.
Domain shadowing is the OpenDns response to a web site redirect when the HTTP 404 error code is received.
Domain shadowing is a fault tolerant method that is used by developers when building and developing web-based services.
Rate this question:
Safe
User
Kernel
Privileged
Rate this question:
Accountability
Availability
Confidentiality
Visibility
Integrity
Rate this question:
Data modification
Denial of service
Theft or extraction of data
Timed execution of malware
Rate this question:
Chosen-ciphertext attack
Birthday attack
Brute-force attack
Ciphertext-only attack
Rate this question:
Birthday attack
Chosen-plaintext attack
Ciphertext-only attack
Chosen-ciphertext attack
Rate this question:
MX
CNAME
AAAA
PTR
Rate this question:
Hash result
Ciphertext
Fingerprint
Message digest
Rate this question:
Secret key (a)
Prime number (p)
Public key (g)
Public key (g)
Rate this question:
The higher the Diffie-Hellman group number indicates a larger key size.
The higher the Diffie-Hellman group number indicates a smaller prime number (p).
The higher the Diffie-Hellman group number indicates a smaller key size.
The higher the Diffie-Hellman group number indicates no difference in processing requirements.
Rate this question:
Net view
Systeminfo
Route print
Netstat
Rate this question:
Message digest (fingerprint) size
Cipher block size
Key size
Encryption operations OSI layer
Rate this question:
Availability
Integrity
Confidentiality
Authentication
Rate this question:
Butterfly effect
Keyed effect
Avalanche effect
Fibonacci effect
Rate this question:
The mail user agent is also called the SMTP daemon.
The DNS A record is used to locate the FQDN of the mail server for a domain.
POP is used by the groupware server to send emails to the MTA.
Microsoft Exchange is the groupware server and Microsoft Outlook is the mail user agent.
-abno
-abe
-ars
-af
Rate this question:
ARP
DHCP
HTTP/HTTPS
ICMP
Rate this question:
POP
IMAP
SMTP
DNS
Rate this question:
Chosen-plaintext attack
Ciphertext-only attack
Birthday attack
Chosen-ciphertext attack
Rate this question:
Systems can only store a certain number of keys and could be unable to generate new keys for communication.
It increases the risk of duplicate keys existing for the key space of the algorithm.
The attacker could have captured the encrypted communication and stored it while waiting for an opportunity to acquire the key.
The risk of weaker keys being generated increases as the number of keys stored increases.
Rate this question:
Type and model of personal vehicle
Business email address
Passport number
Office location
Place and date of birth
Fingerprints
Rate this question:
Quantitative
Non-discretionary
Impact
Qualitative
Mandatory
Discretionary
Rate this question:
Alter
Drop
Select
Get
Post
Rate this question:
The mail user agent is also called the SMTP daemon.
The DNS A record is used to locate the FQDN of the mail server for a domain.
POP is used by the groupware server to send emails to the MTA.
Microsoft Exchange is the groupware server and Microsoft Outlook is the mail user agent.
Rate this question:
DES
SHA256
MD5
AES
DSA
RSA
Rate this question:
When software or hardware updates are released.
When new users are brought on-board
When a new technology or software is planned to be deployed
Only when the network is initially deployed
Rate this question:
Attackers can attack the cryptographic algorithms.
Cryptographic algorithms make it impossible for an attacker to carry out an attack.
Attackers can use cryptography to hide their attacks.
Cryptography does not offer any security against attacks.
Rate this question:
SHA-512
SHA-256
SHA-1
MD5
Rate this question:
The hash is signed using the public key of the receiver.
The hash is stored by the sender.
The hash is encrypted using the private key of the sender.
The hash is appended to the end of the document.
Rate this question:
The practice of breaking codes to obtain the meaning of encrypted data.
The practice of creating one-way encryption cryptographic algorithms.
The practice of breaking codes to obtain the fingerprint of encrypted data.
The practice of creating codes to obscure the meaning of plaintext data.
Rate this question:
The plus (+) signs are used to represent the space character.
The question mark (?) sign is used to represent the space character.
The top-level domain is test.example.com.
The top-level domain is example.com.
Rate this question:
SMTP
POP
LDAP
IMAP
Rate this question:
Option1
Option2
Option3
Option4
Rate this question:
The CA is the trusted third party that signs the public keys of entities in a PKI-based system.
The CA becomes the center point of communications between two hosts using certificates that are issued by the CA.
The CA issues either a certificate revocation list (CRL) or uses an OCSP process to determine certificate validity.
A root CA is not necessary in a PKI.
Rate this question:
DH group
DH prime number (p)
DH modulus
DH base generator (g)
Rate this question:
The same encryption algorithm will be used each time and will be in the client cache.
The server will autofill the stored password for the client upon connection.
The client will receive the same public key that it had stored for the server.
The server will not use any asymmetric encryption, and jump right to symmetric encryption.
Rate this question:
Integrity
Availability
Confidentiality
Accountability
Visibility
Rate this question:
Substitution
Polyalphabetic
Transposition
One-time pad
Rate this question:
Subject’s public key information
Written invitation code to join the CA
Subject identity information
Certificate intended usage
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.