CCNA Security Practice Exam 3 IINS 640-554

CCNA Security Practice Exam 3 IINS 640-554


What function also secures a hash?

 

 

 

 

These are all features of digital signatures except

 

 

 

 

_________ Represents a physical control?

 

 

 

 

ARP spoofing attacks depend on the use of what message?

 

 

 

 

A major disadvantage to using asymmetric encryption algorithms is

 

 

 

 

What is the primary motivation for most attacks against networks today?

 

 

 

 

In terms of access list placement, which is true

 

 

 

 

Cisco recommends which SNMP on your network if you need it?

 

 

 

 

Which of the following indirectly needs the administrator to configure a host name?

 

 

 

 

Which one prevents a brute-force attack on your router by setting a minimum time  to wait before login commands would be accepted after a failed attempt?

 

 

 

 


Question 1 of 10