Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

Cybersecurity Essentials 1.1 Chapter 5 Quiz Online

Last Updated on May 20, 2021 by Admin

Cybersecurity Essentials 1.1 Chapter 5 Quiz Online

CE -- Chapter 5 Quiz

Time limit: 0

Quiz-summary

0 of 20 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

Information

CE — Chapter 5 Quiz

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 20 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  1. Answered
  2. Review
  1. Question 1 of 20
    1. Question
    1 points
    What is a strength of using a hashing function?
    Correct

    Incorrect

    Understanding the properties of a hash function shows its applicability such as one-way function, arbitrary input length, and fixed output.

    Hint

    Understanding the properties of a hash function shows its applicability such as one-way function, arbitrary input length, and fixed output.

  2. Question 2 of 20
    2. Question
    1 points
    A user is instructed by a boss to find a better method to secure passwords in transit. The user has researched several means to do so and has settled on using HMAC. What are the key elements needed to implement HMAC?
    Correct

    Incorrect

    HMAC implementation is a secret key added to a hash.​

    Hint

    HMAC implementation is a secret key added to a hash.​

  3. Question 3 of 20
    3. Question
    1 points
    Which method tries all possible passwords until a match is found?
    Correct

    Incorrect

    Two common methods of cracking hashes are dictionary and brute force. Given time, the brute force method will always crack a password.

    Hint

    Two common methods of cracking hashes are dictionary and brute force. Given time, the brute force method will always crack a password.

  4. Question 4 of 20
    4. Question
    1 points
    An investigator finds a USB drive at a crime scene and wants to present it as evidence in court. The investigator takes the USB drive and creates a forensic image of it and takes a hash of both the original USB device and the image that was created. What is the investigator attempting to prove about the USB drive when the evidence is submitted in court?
    Correct

    Incorrect

    A hash function ensures the integrity of a program, file, or device.

    Hint

    A hash function ensures the integrity of a program, file, or device.

  5. Question 5 of 20
    5. Question
    3 points
    What are three type of attacks that are preventable through the use of salting? (Choose three.)
    Correct

    Incorrect

    Salting makes precomputed tables ineffective because of the random string that is used.

    Hint

    Salting makes precomputed tables ineffective because of the random string that is used.

  6. Question 6 of 20
    6. Question
    1 points
    A user has been asked to implement IPsec for inbound external connections. The user plans to use SHA-1 as part of the implementation. The user wants to ensure the integrity and authenticity of the connection. What security tool can the user use?
    Correct

    Incorrect

    HMAC provides the additional feature of a secret key to ensure integrity and authentication.​

    Hint

    HMAC provides the additional feature of a secret key to ensure integrity and authentication.​

  7. Question 7 of 20
    7. Question
    1 points
    A user downloads an updated driver for a video card from a website. A warning message pops up saying the driver is not approved. What does this piece of software lack?
    Correct

    Incorrect

    Code signing is a method of verifying code integrity

    Hint

    Code signing is a method of verifying code integrity

  8. Question 8 of 20
    8. Question
    1 points
    What is the purpose of CSPRNG?
    Correct

    Incorrect

    Salting prevents someone from using a dictionary attack to guess a password. Cryptographically Secure Pseudo-Random Number Generator (CSPRNG) is one way (and the best way) to generate salt.

    Hint

    Salting prevents someone from using a dictionary attack to guess a password. Cryptographically Secure Pseudo-Random Number Generator (CSPRNG) is one way (and the best way) to generate salt.

  9. Question 9 of 20
    9. Question
    1 points
    A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?
    Correct

    Incorrect

    Hashing is a method to ensure integrity and ensures that the data is not changed.

    Hint

    Hashing is a method to ensure integrity and ensures that the data is not changed.

  10. Question 10 of 20
    10. Question
    1 points
    A recent email sent throughout the company stated that there would be a change in security policy. The security officer who was presumed to have sent the message stated the message was not sent from the security office and the company may be a victim of a spoofed email. What could have been added to the message to ensure the message actually came from the person?
    Correct

    Incorrect

    Digital signatures ensures non-repudiation or the ability not to deny that a specific person sent a message.

    Hint

    Digital signatures ensures non-repudiation or the ability not to deny that a specific person sent a message.

  11. Question 11 of 20
    11. Question
    1 points
    A recent breach at a company was traced to the ability of a hacker to access the corporate database through the company website by using malformed data in the login form. What is the problem with the company website?
    Correct

    Incorrect

    The ability to pass malformed data through a website is a form of poor input validation.

    Hint

    The ability to pass malformed data through a website is a form of poor input validation.

  12. Question 12 of 20
    12. Question
    3 points
    What are three validation criteria used for a validation rule? (Choose three.)
    Correct

    Incorrect

    Criteria used in a validation rule include format, consistency, range, and check digit.

    Hint

    Criteria used in a validation rule include format, consistency, range, and check digit.

  13. Question 13 of 20
    13. Question
    1 points
    A user is connecting to an e-commerce server to buy some widgets for a company. The user connects to the site and notices there is no lock in the browser security status bar. The site does prompt for a username and password and the user is able to log in. What is the danger in proceeding with this transaction?
    Correct

    Incorrect

    The lock in the browser window ensures a secure connection is being established and is not blocked by browser add-ons​.

    Hint

    The lock in the browser window ensures a secure connection is being established and is not blocked by browser add-ons​.

  14. Question 14 of 20
    14. Question
    3 points
    Identify three situations in which the hashing function can be applied. (Choose three.)
    Correct

    Incorrect

    Three situations where a hash function could be used are as follows:

    • When IPsec is being used
    • When routing authentication is enabled
    • In challenge responses within protocols such as PPP CHAP
    • Within digitally signed contracts and PKI certificates
    Hint

    Three situations where a hash function could be used are as follows:

    • When IPsec is being used
    • When routing authentication is enabled
    • In challenge responses within protocols such as PPP CHAP
    • Within digitally signed contracts and PKI certificates
  15. Question 15 of 20
    15. Question
    1 points
    What is the standard for a public key infrastructure to manage digital certificates?
    Correct

    Incorrect

    The x.509 standard is for a PKI infrastructure and x.500 if for directory structures.​

    Hint

    The x.509 standard is for a PKI infrastructure and x.500 if for directory structures.​

  16. Question 16 of 20
    16. Question
    3 points
    A user is evaluating the security infrastructure of a company and notices that some authentication systems are not using best practices when it comes to storing passwords. The user is able to crack passwords very fast and access sensitive data. The user wants to present a recommendation to the company on the proper implementation of salting to avoid password cracking techniques. What are three best practices in implementing salting? (Choose three.)
    Correct

    Incorrect

    Salting needs to be unique and not reused. Doing the opposite will cause passwords to be cracked easily.

    Hint

    Salting needs to be unique and not reused. Doing the opposite will cause passwords to be cracked easily.

  17. Question 17 of 20
    17. Question
    1 points
    A user is the database administrator for a company. The user has been asked to implement an integrity rule that states every table ​must have a primary key and that the column or columns chosen to be the primary key must be unique and not null. Which integrity requirement is the user implementing?
    Correct

    Incorrect

    There are three major database integrity requirements: entity, referential, and domain integrity.

    Hint

    There are three major database integrity requirements: entity, referential, and domain integrity.

  18. Question 18 of 20
    18. Question
    3 points
    What are three NIST-approved digital signature algorithms? (Choose three.)
    Correct

    Incorrect

    NIST chooses approved algorithms based on public key techniques and ECC. The digital signature algorithms approved are DSA, RSA, and ECDSA.

    Hint

    NIST chooses approved algorithms based on public key techniques and ECC. The digital signature algorithms approved are DSA, RSA, and ECDSA.

  19. Question 19 of 20
    19. Question
    1 points
    Alice and Bob use the same password to login into the company network. This means both would have the exact same hash for their passwords. What could be implemented to prevent both password hashes from being the same?
    Correct

    Incorrect

    A password is stored as a combination of both a hash and a salt.

    Hint

    A password is stored as a combination of both a hash and a salt.

  20. Question 20 of 20
    20. Question
    1 points
    What is the step by step process for creating a digital signature?
    Correct

    Incorrect

    In order to create a digital signature, the following steps must be taken:

    1. The message and message digest are created.
    2. The digest and private key are encrypted.
    3. The message, encrypted message digest, and public key are bundled to create the signed document.
    Hint

    In order to create a digital signature, the following steps must be taken:

    1. The message and message digest are created.
    2. The digest and private key are encrypted.
    3. The message, encrypted message digest, and public key are bundled to create the signed document.
  • CCNA1 v7
  • CCNA2 v7
  • CCNA3 v7
System Test Exam Answers
Modules 1 – 3 Exam Answers
Modules 4 – 7 Exam Answers
Modules 8 – 10 Exam Answers
Modules 11 – 13 Exam Answers
Modules 14 – 15 Exam Answers
Modules 16 – 17 Exam Answers
Practice Final – ITN Answers
Course Feedback
ITN Practice PT Skills Assessment (PTSA)
Final Exam Answers
Modules 1 – 4 Exam Answers
Modules 5 – 6 Exam Answers
Modules 7 – 9 Exam Answers
Modules 10 – 13 Exam Answers
Modules 14 – 16 Exam Answers
ITN Practice Skills Assessment – PT Answers
SRWE Practice Skills Assessment – PT Part 1 Answers
SRWE Practice Skills Assessment – PT Part 2 Answers
SRWE Hands On Skills Exam Answers
SRWE Practice Final Exam Answers
SRWE Final Exam Answers 
Modules 1 – 2 Exam Answers
Modules 3 – 5 Exam Answers
Modules 6 – 8 Exam Answers
Modules 9 – 12 Exam Answers
Modules 13 – 14 Exam Answers
ITN Practice PT Skills Assessment (PTSA) Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
ENSA Practice PT Skills Assessment (PTSA) Answers
ENSA Hands On Skills Exam Answers
Practice Final – ENSA Answers
ENSA Final Exam Answers
CCNA Certification Practice Exam Answers

Copyright © 2023 PressExam.