This CCNA Cyber Ops (210-250 SECFND) quiz assesses knowledge on cryptography, SSL\/TLS communications, cipher types, hash algorithms, and data integrity. It prepares learners for handling security protocols and understanding potential vulnerabilities in network security.
Perform analysis of the NetFlow data to detect anomalous TLS/SSL flows
Perform firewall HTTP application inspection to detect for the command and control traffic
Perform decryption and inspection of SSL/TLS traffic
Perform IPS HTTP deep packets inspection to detect for the command and control traffic
Rate this question:
Substitution
Polyalphabetic
Transposition
One-time pad
Rate this question:
SHA-512
SHA-256
SHA-1
MD5
Rate this question:
Integrity
Availability
Authentication
Confidentiality
Rate this question:
Message digest (fingerprint) size
Cipher block size
Key size
Encryption operations OSI layer
Rate this question:
Availability
Integrity
Confidentiality
Authentication
Rate this question:
Hash result
Ciphertext
Fingerprint
Message digest
Rate this question:
Asymmetric encryption algorithm
Dodecaphonic algorithm
Diffie-Hellman algorithm
Symmetric encryption algorithm
Rate this question:
Asymmetric encryption algorithm
Symmetric encryption algorithm
Dodecaphonic algorithm
Diffie-Hellman algorithm
Rate this question:
Brute-force attack
Birthday attack
Meet-in-the-middle attack
Ciphertext-only attack
Rate this question:
The practice of breaking codes to obtain the meaning of encrypted data.
The practice of creating one-way encryption cryptographic algorithms.
The practice of breaking codes to obtain the fingerprint of encrypted data.
The practice of creating codes to obscure the meaning of plaintext data.
Rate this question:
Chosen-ciphertext attack
Birthday attack
Brute-force attack
Ciphertext-only attack
Rate this question:
ECB
CBC
DES
3DES
Rate this question:
DES
SHA256
MD5
AES
DSA
RSA
Rate this question:
Which one of the following encryption methodologies allows you to maintain the privacy of an email communication, and ensure the origin of the message using PGP?
Encrypt the message with your private key, and again with the destination’s public key, so that the recipients can decrypt the message with their private key and your public key.
Encrypt the message with your public key, and again with the destination’s private key, so that the recipients can decrypt the message with your private key and their public key.
Encrypt the message with the destination’s private key so that the recipients can decrypt it with their private key and know they are the only party who generated the private key.
Rate this question:
Sender’s private key
Sender’s shared key
Sender’s public key
Sender’s digital signature
Rate this question:
Secret key (a)
Prime number (p)
Public key (g)
Public key (g)
Rate this question:
The higher the Diffie-Hellman group number indicates a larger key size.
The higher the Diffie-Hellman group number indicates a smaller prime number (p).
The higher the Diffie-Hellman group number indicates a smaller key size.
The higher the Diffie-Hellman group number indicates no difference in processing requirements.
Rate this question:
The server requests a username and password from the user.
The server sends a public key to the client.
The client generates a session key.
The client and server agree upon the encryption algorithm.
Rate this question:
The hash is signed using the public key of the receiver.
The hash is stored by the sender.
The hash is encrypted using the private key of the sender.
The hash is appended to the end of the document.
Rate this question:
Integrity
Confidentiality
Non-repudiation
Authenticity
Availability
Rate this question:
Serial number
User name
Issuer
Validity date range
Subject
Subject public key info
Department name
Rate this question:
The client devices must trust the issuing CA root certificate to validate and trust another device certificate that is issued by the same CA.
Currently, the PKI architecture requires that the client devices stay in constant contact with the CA in order to trust a certificate that is issued by the CA.
The CA does not sign the user or device certificate; it only signs its own root certificate.
Currently, PKI digital identity certificates use the X.509 version 3 structure.
Rate this question:
Decrypt the certificate signature using the CA private key and check to make sure that the certificate hash matches what they received from the peer.
Send a message encrypted with the system’s peer’s public key to verify that the peer can decrypt the message with the private key of the entity that is identified in the certificate.
Ensure that the issuer and the subject match on the certificate of the peer.
Contact the CA by phone to determine how they validated the identity of the system during certificate enrollment of the peer that they are communicating with.
Rate this question:
The CA is the trusted third party that signs the public keys of entities in a PKI-based system.
The CA becomes the center point of communications between two hosts using certificates that are issued by the CA.
The CA issues either a certificate revocation list (CRL) or uses an OCSP process to determine certificate validity.
A root CA is not necessary in a PKI.
Rate this question:
Subject’s public key information
Written invitation code to join the CA
Subject identity information
Certificate intended usage
Rate this question:
Cipher suites using RC4
Cipher suites using MD5
Cipher suites using AES
Cipher suites using SHA-256
Cipher suites using DES
Rate this question:
Authentication and key exchange algorithms
Public key version and type
Encryption algorithm
Peer IP address information
Message authentication code algorithm
The PRF
Rate this question:
Authentication and key exchange
Encryption
Message authentication code
Pseudorandom function
Rate this question:
Amount of time that a brute force attempt would take to discover the key
Randomness of a generated key
Number of possible keys that could be generated by an algorithm
Number of bits that are contained in a key
Rate this question:
Data that is more sensitive and needs to be kept secret longer must use longer keys.
Choose the key length according to the type of encryption algorithm that is to be used.
Key length depends on the support of the device that will be using the key.
You should choose the key length so that it protects data confidentiality or integrity for an adequate time.
Rate this question:
Destruction of keys
Identification
Storage
Subject identity
Secure generation
Verification
Exchange
Matching
Rate this question:
Use AES with 128- or 256-bit keys in the GCM mode.
NSA Suite B calls for AES CBC mode because it can provide authenticated encryption.
NSA Suite B calls for ECDH, which is a more advanced variant of the Diffie-Hellman algorithm using the elliptic curve mathematics model.
The SHA-1 message digest has stronger security than SHA-2.
Rate this question:
AES
MD5
ECDSA
ECDH
3DES
SHA-2 (SHA-256 and SHA-384)
Diffie-Hellman Group5
Rate this question:
Cryptographic attacks can be used to find a weakness in the cryptographic algorithms.
All the employee's SSL/TLS outbound traffic should be decrypted and inspected since it requires minimal resources on the security appliance.
With the increased legitimate usage of HTTPS traffic, attackers have taken advantage of this blind spot to launch attacks over HTTPS more than ever before.
Encryption does not pose a threat to the ability of law enforcement authorities to gain access to information for investigating and prosecuting cybercriminal activities.
Rate this question:
Both parties calculate an authenticated MD5 hash value of the data accompanying the message—one party uses the private key, while the other party uses the public key.
Both parties calculate a CRC32 of the data before and after transmission of the message.
Both parties obfuscate the data with XOR and a known key before and after transmission of the message.
Both parties to the communication use the same secret key to produce a message authentication code to accompany the message.
Rate this question:
Butterfly effect
Keyed effect
Avalanche effect
Fibonacci effect
Rate this question:
Cipher text
Asymmetric encryption
Symmetric encryption
Avalanche effect
Rate this question:
Chosen-plaintext attack
Ciphertext-only attack
Birthday attack
Chosen-ciphertext attack
Rate this question:
Birthday attack
Chosen-plaintext attack
Ciphertext-only attack
Chosen-ciphertext attack
Rate this question:
80 bits
41 bits
120 bits
160 bits
Rate this question:
Asymmetric algorithms are substantially slower than symmetric algorithms.
Asymmetric algorithms are easier to break than symmetric algorithms.
Symmetric algorithms can provide authentication and confidentiality.
Symmetric algorithms use a much larger key size.
Rate this question:
DH group
DH prime number (p)
DH modulus
DH base generator (g)
Rate this question:
The same encryption algorithm will be used each time and will be in the client cache.
The server will autofill the stored password for the client upon connection.
The client will receive the same public key that it had stored for the server.
The server will not use any asymmetric encryption, and jump right to symmetric encryption.
Rate this question:
Only the recipient has a copy of the private key to decrypt the signature
Both the signer and the recipient must first agree on the public/private key pair that is only known to both parties.
Only the signer has sole possession of the private key.
Both the signer and the recipient must first agree on a shared secret key that is only known to both parties.
Rate this question:
A digital certificate certifies the ownership of the public key of the named subject of the certificate.
A digital certificate certifies the ownership of the public key of the named subject of the certificate.
A digital certificate certifies the ownership of the public key of the named subject of the certificate. A digital certificate certifies the ownership of the public key of the named subject of the certificate.
A digital certificate certifies the ownership of the public key of the named subject of the certificate.
Rate this question:
The client checks with the CA to determine whether a certificate has been revoked.
The client validates with the CA to determine if the peer that they are communicating with is the entity that is identified in a certificate.
A new signed certificate is received by the certificate applicant from the CA.
The CA administrator contacts the certificate applicant to verify enrollment data before the request can be approved.
Rate this question:
The current time is within the certificate’s validity date.
The subject matches the URL that is being visited.
The signature of the CA that is in the certificate is valid.
A root DNS server provided the IP address for the URL.
The website was already in the browser’s cache.
The client already has a session key for the URL.
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.