CCNA Security Practice Exam 3 IINS 640-554

CCNA Security Practice Exam 3 IINS 640-554


A major disadvantage to using asymmetric encryption algorithms is

 
 
 
 

_________ Represents a physical control?

 
 
 
 

These are all features of digital signatures except

 
 
 
 

ARP spoofing attacks depend on the use of what message?

 
 
 
 

In terms of access list placement, which is true

 
 
 
 

Which one prevents a brute-force attack on your router by setting a minimum timeĀ  to wait before login commands would be accepted after a failed attempt?

 
 
 
 

Which of the following indirectly needs the administrator to configure a host name?

 
 
 
 

Cisco recommends which SNMP on your network if you need it?

 
 
 
 

What function also secures a hash?

 
 
 
 

What is the primary motivation for most attacks against networks today?

 
 
 
 


Question 1 of 10