Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

Cybersecurity Essentials 1.1 Chapter 4 Quiz Online

Last Updated on May 20, 2021 by Admin

Cybersecurity Essentials 1.1 Chapter 4 Quiz Online

CE -- Chapter 4 Quiz

Time limit: 0

Quiz-summary

0 of 20 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

Information

CE — Chapter 4 Quiz

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 20 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  1. Answered
  2. Review
  1. Question 1 of 20
    1. Question
    1 points
    What is the name of the method in which letters are rearranged to create the ciphertext?
    Correct

    Incorrect

    Ciphertext can be created by using the following:

    • Transposition – letters are rearranged
    • Substitution – letters are replaced
    • One-time pad – plaintext combined with a secret key creates a new character, which then combines with the plaintext to produce ciphertext
    Hint

    Ciphertext can be created by using the following:

    • Transposition – letters are rearranged
    • Substitution – letters are replaced
    • One-time pad – plaintext combined with a secret key creates a new character, which then combines with the plaintext to produce ciphertext
  2. Question 2 of 20
    2. Question
    1 points
    Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?
    Correct

    Incorrect

    The Advanced Encryption Standard (AES) is used to protect classified information by the U.S. government and is a strong algorithm that uses longer key lengths.

    Hint

    The Advanced Encryption Standard (AES) is used to protect classified information by the U.S. government and is a strong algorithm that uses longer key lengths.

  3. Question 3 of 20
    3. Question
    1 points
    Which term describes the technology that protects software from unauthorized access or modification?
    Correct

    Incorrect

    Software watermarking inserts a secret message into the program as proof of ownership and protects software from unauthorized access or modification.

    Hint

    Software watermarking inserts a secret message into the program as proof of ownership and protects software from unauthorized access or modification.

  4. Question 4 of 20
    4. Question
    3 points
    Which three devices represent examples of physical access controls? (Choose three.)
    Correct

    Incorrect

    • Physical access controls include but are not limited to the following:

      Guards

    • Fences
    • Motion detectors
    • Laptop locks
    • Locked doors
    • Swipe cards
    • Guard dogs
    • Video cameras
    • Mantraps
    • Alarms

    Hint
    • Physical access controls include but are not limited to the following:

      Guards

    • Fences
    • Motion detectors
    • Laptop locks
    • Locked doors
    • Swipe cards
    • Guard dogs
    • Video cameras
    • Mantraps
    • Alarms
  5. Question 5 of 20
    5. Question
    1 points
    What term is used to describe the technology that replaces sensitive information with a nonsensitive version?
    Correct

    Incorrect

    Data masking replaces sensitive information with nonsensitive information. After replacement, the nonsensitive version looks and acts like the original.

    Hint

    Data masking replaces sensitive information with nonsensitive information. After replacement, the nonsensitive version looks and acts like the original.

  6. Question 6 of 20
    6. Question
    1 points
    Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?
    Correct

    Incorrect

    Block ciphers transform a fixed-length block of plaintext into a block of ciphertext. To decrypt the ciphertext, the same secret key to encrypt is used in reverse.

    Hint

    Block ciphers transform a fixed-length block of plaintext into a block of ciphertext. To decrypt the ciphertext, the same secret key to encrypt is used in reverse.

  7. Question 7 of 20
    7. Question
    1 points
    What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
    Correct

    Incorrect

    Symmetric encryption algorithms use the same pre-shared key to encrypt and decrypt data.

    Hint

    Symmetric encryption algorithms use the same pre-shared key to encrypt and decrypt data.

  8. Question 8 of 20
    8. Question
    1 points
    What type of cipher encrypts plaintext one byte or one bit at a time?
    Correct

    Incorrect

    Stream ciphers encrypt plaintext one byte or one bit at a time, and can be much faster than block ciphers.

    Hint

    Stream ciphers encrypt plaintext one byte or one bit at a time, and can be much faster than block ciphers.

  9. Question 9 of 20
    9. Question
    1 points
    What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?
    Correct

    Incorrect

    Elliptic curve cryptography (ECC) uses elliptic curves as part of the algorithm for digital signature generation and key exchange.

    Hint

    Elliptic curve cryptography (ECC) uses elliptic curves as part of the algorithm for digital signature generation and key exchange.

  10. Question 10 of 20
    10. Question
    1 points
    What is the term used to describe the science of making and breaking secret codes?
    Correct

    Incorrect

    Cryptology is the science of making and breaking codes to make sure that cyber criminals cannot easily compromise protected information.

    Hint

    Cryptology is the science of making and breaking codes to make sure that cyber criminals cannot easily compromise protected information.

  11. Question 11 of 20
    11. Question
    3 points
    Which three processes are examples of logical access controls? (Choose three.)
    Correct

    Incorrect

    Logical access controls includes but is not limited to the following:

    • Encryption
    • Smart cards
    • Passwords
    • Biometrics
    • Access Control Lists (ACLs)
    • Protocols
    • Firewalls
    • Intrusion Detection Systems (IDS)
    Hint

    Logical access controls includes but is not limited to the following:

    • Encryption
    • Smart cards
    • Passwords
    • Biometrics
    • Access Control Lists (ACLs)
    • Protocols
    • Firewalls
    • Intrusion Detection Systems (IDS)
  12. Question 12 of 20
    12. Question
    1 points
    What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
    Correct

    Incorrect

    Steganography conceals data in a file such as a graphic, audio, or other text file and is used to prevent extra attention to the encrypted data because the data is not easily viewed.

    Hint

    Steganography conceals data in a file such as a graphic, audio, or other text file and is used to prevent extra attention to the encrypted data because the data is not easily viewed.

  13. Question 13 of 20
    13. Question
    3 points
    What are three examples of administrative access controls? (Choose three.)
    Correct

    Incorrect

    Administrative access controls are defined by organizations to implement and enforce all aspects of controlling unauthorized access and include the following:

    • Policies
    • Procedures
    • Hiring practices
    • Background checks
    • Data classification
    • Security training
    • Reviews
    Hint

    Administrative access controls are defined by organizations to implement and enforce all aspects of controlling unauthorized access and include the following:

    • Policies
    • Procedures
    • Hiring practices
    • Background checks
    • Data classification
    • Security training
    • Reviews
  14. Question 14 of 20
    14. Question
    3 points
    Which three protocols use asymmetric key algorithms? (Choose three.)
    Correct

    Incorrect

    Four protocols use asymmetric key algorithms:

    • Internet Key Exchange (IKE)
    • Secure Socket Layer (SSL)
    • Secure Shell (SSH)
    • Pretty Good Privacy (PGP)
    Hint

    Four protocols use asymmetric key algorithms:

    • Internet Key Exchange (IKE)
    • Secure Socket Layer (SSL)
    • Secure Shell (SSH)
    • Pretty Good Privacy (PGP)
  15. Question 15 of 20
    15. Question
    1 points
    A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?
    Correct

    Incorrect

    Deterrents are implemented to discourage or mitigate an action or the behavior of a malicious person.

    Hint

    Deterrents are implemented to discourage or mitigate an action or the behavior of a malicious person.

  16. Question 16 of 20
    16. Question
    2 points
    Which two terms are used to describe cipher keys? (Choose two.)
    Correct

    Incorrect

  17. Question 17 of 20
    17. Question
    3 points
    Match the type of multifactor authentication with the description.
    Sort elements
    • something you have
    • something you are
    • something you know
    • a security key fob
      • a fingerprint scan
        • a password
          Correct

          Incorrect

          Multi-factor authentication uses a minimum of two methods of verification and can include the following:

          • Something you have
          • Something you know
          • Something you are
          Hint

          Multi-factor authentication uses a minimum of two methods of verification and can include the following:

          • Something you have
          • Something you know
          • Something you are
        • Question 18 of 20
          18. Question
          5 points
          Match the description with the correct term. (Not all targets are used.)
          Sort elements
          • hiding data within an audio file
          • discovering that hidden information exists within a graphic file
          • creating a message that says one thing but means something else to a specific audience
          • making a message confusing so it is harder to understand
          • replacing sensitive information in a file with nonsensitive information
          • steganography
            • steganalysis
              • social steganography
                • obfuscation
                  Correct

                  Incorrect

                • Question 19 of 20
                  19. Question
                  1 points
                  Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
                  Correct

                  Incorrect

                  Diffie-Hellman provides an electronic exchange method to share a secret key and is used by multiple secure protocols.

                  Hint

                  Diffie-Hellman provides an electronic exchange method to share a secret key and is used by multiple secure protocols.

                • Question 20 of 20
                  20. Question
                  1 points
                  What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
                  Correct

                  Incorrect

                  Asymmetric encryption uses one key to encrypt data and a different key to decrypt data.

                  Hint

                  Asymmetric encryption uses one key to encrypt data and a different key to decrypt data.

                • CCNA1 v7
                • CCNA2 v7
                • CCNA3 v7
                System Test Exam Answers
                Modules 1 – 3 Exam Answers
                Modules 4 – 7 Exam Answers
                Modules 8 – 10 Exam Answers
                Modules 11 – 13 Exam Answers
                Modules 14 – 15 Exam Answers
                Modules 16 – 17 Exam Answers
                Practice Final – ITN Answers
                Course Feedback
                ITN Practice PT Skills Assessment (PTSA)
                Final Exam Answers
                Modules 1 – 4 Exam Answers
                Modules 5 – 6 Exam Answers
                Modules 7 – 9 Exam Answers
                Modules 10 – 13 Exam Answers
                Modules 14 – 16 Exam Answers
                ITN Practice Skills Assessment – PT Answers
                SRWE Practice Skills Assessment – PT Part 1 Answers
                SRWE Practice Skills Assessment – PT Part 2 Answers
                SRWE Hands On Skills Exam Answers
                SRWE Practice Final Exam Answers
                SRWE Final Exam Answers 
                Modules 1 – 2 Exam Answers
                Modules 3 – 5 Exam Answers
                Modules 6 – 8 Exam Answers
                Modules 9 – 12 Exam Answers
                Modules 13 – 14 Exam Answers
                ITN Practice PT Skills Assessment (PTSA) Answers
                SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
                SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
                ENSA Practice PT Skills Assessment (PTSA) Answers
                ENSA Hands On Skills Exam Answers
                Practice Final – ENSA Answers
                ENSA Final Exam Answers
                CCNA Certification Practice Exam Answers

                Copyright © 2023 PressExam.