Last Updated on October 21, 2019 by Admin
Implementing Network Security ( Version 2.0) – CCNAS Chapter 7 Exam Answers 2019 Full 100%

What is the focus of cryptanalysis?
 hiding secret codes
 developing secret codes
 breaking encrypted codes
 implementing encrypted codes
Explanation: Cryptology is the science of making and breaking secret codes. There are two separate disciplines in cryptology, cryptography and cryptanalysis. Cryptography is the development and use of codes. Cryptanalysis is the breaking of those secret (encrypted) codes.

How many bits does the Data Encryption Standard (DES) use for data encryption?
 40 bits
 56 bits
 64 bits
 72 bits
Explanation: DES uses a fixed length key. The key is 64bits long, but only 56 bits are used for encryption. The remaining 8 bits are used for parity. A DES encryption key is always 56 bits long. When DES is used with a weaker encryption of a 40bit key, the encryption key is 40 secret bits and 16 known bits, which make the key length 56 bits.

Which statement describes the SoftwareOptimized Encryption Algorithm (SEAL)?
 SEAL is a stream cipher.
 It uses a 112bit encryption key.
 It is an example of an asymmetric algorithm.
 It requires more CPU resources than softwarebased AES does.
Explanation: SEAL is a stream cipher that uses a 160bit encryption key. It is a symmetric encryption algorithm that has a lower impact on the CPU resources compared to other softwarebased algorithms, such as softwarebased DES, 3DES, and AES.

Which encryption algorithm is an asymmetric algorithm?
 DH
 AES
 3DES
 SEAL
Explanation: DH is an asymmetric algorithm. AES, 3DES, and SEAL are all symmetric algorithms.

An online retailer needs a service to support the nonrepudiation of the transaction. Which component is used for this service?
 the digital signatures
 the public key of the retailer
 the private key of the retailer
 the unique shared secret known only by the retailer and the customer
Explanation: Digital signatures, generated by hash function, can provide the service for nonrepudiation of the transaction. Both public and private keys are used to encrypt data during the transaction. Shared secrets between the retailer and customers are not used.

In which situation is an asymmetric key algorithm used?
 Two Cisco routers authenticate each other with CHAP.
 A network administrator connects to a Cisco router with SSH.
 User data is transmitted across the network after a VPN is established.
 An office manager encrypts confidential files before saving them to a removable device.
Explanation: The SSH protocol uses an asymmetric key algorithm to authenticate users and encrypt data transmitted. The SSH server generates a pair of public/private keys for the connections. Encrypting files before saving them to a storage device uses a symmetric key algorithm because the same key is used to encrypt and decrypt files. The router authentication with CHAP uses a symmetric key algorithm. The key is preconfigured by the network administrator. A VPN may use both an asymmetric key and a symmetric encryption algorithm. For example in an IPSec VPN implementation, the data transmission uses a shared secret (generated with an asymmetric key algorithm) with a symmetric encryption algorithm used for performance.

What is the purpose of a nonrepudiation service in secure communications?
 to provide the highest encryption level possible
 to ensure that the source of the communications is confirmed
 to confirm the identity of the recipient of the communications
 to ensure that encrypted secure communications cannot be decoded
Explanation: Nonrepudiation uses the unique characteristics of the sender of a message to confirm that the reputed sender is in fact the actual sender.

Which objective of secure communications is achieved by encrypting data?
 authentication
 availability
 confidentiality
 integrity
Explanation: When data is encrypted, it is scrambled to keep the data private and confidential so that only authorized recipients can read the message. A hash function is another way of providing confidentiality.

Why is the 3DES algorithm often preferred over the AES algorithm?
 AES is more expensive to implement than 3DES.
 3DES is more trusted because it has been proven secure for a longer period than AES.
 Major networking equipment vendors such as Cisco have not yet adopted AES.
 3DES performs better in highthroughput, lowlatency environments than AES.
Explanation: Despite its advantages, AES is a relatively young algorithm. An important rule of cryptography is that a mature algorithm is always more trusted. 3DES is therefore a more trusted choice in terms of strength, because it has been tested and analyzed for 35 years. AES can be used in highthroughput, lowlatency environments, especially when 3DES cannot handle the throughput or latency requirements. AES is available in a number of Cisco VPN devices as an encryption transform.

What is the most common use of the DiffieHelman algorithm in communications security?
 to provide routing protocol authentication between routers
 to create password hashes for secure authentication
 to encrypt data for secure ecommerce communications
 to secure the exchange of keys used to encrypt data
Explanation: DiffieHelman is not an encryption mechanism and is not typically used to encrypt data. Instead, it is a method to securely exchange the keys used to encrypt the data.

Which type of encryption algorithm uses public and private keys to provide authentication, integrity, and confidentiality?
 IPsec
 symmetric
 asymmetric
 shared secret
Explanation: An asymmetric encryption algorithm uses two keys, namely a public key and a private key. A symmetric encryption algorithm uses an identical key for both encryption and decryption. A shared secret is an example of using symmetric algorithm.

How do modern cryptographers defend against bruteforce attacks?
 Use statistical analysis to eliminate the most common encryption keys.
 Use an algorithm that requires the attacker to have both ciphertext and plaintext to conduct a successful attack.
 Use a keyspace large enough that it takes too much money and too much time to conduct a successful attack.
 Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message.
Explanation: In a bruteforce attack, an attacker tries every possible key with the decryption algorithm knowing that eventually one of them will work. To defend against the bruteforce attacks, modern cryptographers have as an objective to have a keyspace (a set of all possible keys) large enough so that it takes too much money and too much time to accomplish a bruteforce attack. A security policy requiring passwords to be changed in a predefined interval further defend against the bruteforce attacks. The idea is that passwords will have been changed before an attacker exhausts the keyspace.

Which encryption protocol provides network layer confidentiality?
 IPsec protocol suite
 Keyed MD5
 Message Digest 5
 Secure Sockets Layer
 Secure Hash Algorithm 1
 Transport Layer Security
Explanation: Cryptographic encryption can provide confidentiality at several layers of the OSI model. For example, network layer protocols, such as the IPsec protocol suite, provide network layer confidentiality. Secure Sockets Layer (SSL) or Transport Layer Security (TLS), provide session layer confidentiality. MD5, Keyed MD5, and Secure Hash Algorithm 1 are examples of hash functions. They provide data integrity but not data confidentiality.

Refer to the exhibit. Which encryption algorithm is described in the exhibit?
 3DES
 AES
 DES
 RC4
 SEAL
Explanation: 3DES is a good choice to protect data because it has an algorithm that is very trusted and has security strength.

Which statement describes asymmetric encryption algorithms?
 They include DES, 3DES, and AES.
 They have key lengths ranging from 80 to 256 bits.
 They are also called sharedsecret key algorithms.
 They are relatively slow because they are based on difficult computational algorithms.
Explanation: DES, 3DES, and AES are examples of symmetric encryption algorithms (also known as shared secret key algorithms). The usual key length for symmetric algorithms is 80256 bits. Asymmetric algorithms are relatively slow because they are based on difficult computational algorithms.

Which two nonsecret numbers are initially agreed upon when the DiffieHellman algorithm is used? (Choose two.)
 elliptic curve invariant
 generator
 pseudorandom nome
 binomial coefficient
 prime modulus
 topological index
Explanation: DH is a mathematical algorithm that allows two hosts to generate an identical shared secret on both systems without having communicated before. To start a DH exchange, both hosts must agree on two nonsecret numbers. The first number is a base number, also called the generator. The second number is a prime number that is used as the modulus. These numbers are usually public and are chosen from a table of known values.

In what situation would an asymmetric algorithm most likely be used?
 logging onto a computer
 making an online purchase
 uploading a networking book chapter using FTP
 transferring a large stream of data between two corporate locations
Explanation: Asymmetric algorithms are slow, so they are commonly used in lowvolume transactions such as making online purchases or logging into a financial website.

Why is asymmetric algorithm key management simpler than symmetric algorithm key management?
 Only one key is used.
 It uses fewer bits.
 Two public keys are used for the key exchange.
 One of the keys can be made public.
Explanation: Asymmetric algorithms use two keys, a public and a private key. Key management is simpler because one of the keys can be made public.

What is the purpose of code signing?
 data encryption
 reliable transfer of data
 source identity secrecy
 integrity of source .EXE files
Explanation: Code signing is used to verify the integrity of executable files downloaded from a vendor website. Code signing uses digital certificates to authenticate and verify the identity of a website.

Which algorithm can ensure data confidentiality?
 MD5
 AES
 RSA
 PKI
Explanation: Data confidentiality is ensured through symmetric encryption algorithms, including DES, 3DES, and AES.

What is the purpose of a digital certificate?
 It guarantees that a website has not been hacked.
 It provides proof that data has a traditional signature attached.
 It ensures that the person who is gaining access to a network device is authorized.
 It authenticates a website and establishes a secure connection to exchange confidential data.
Explanation: Digital signatures commonly use digital certificates that are used to verify the identity of the originator in order to authenticate a vendor website and establish an encrypted connection to exchange confidential data. One such example is when a person logs into a financial institution from a web browser.

What type of encryption algorithm uses the same key to encrypt and decrypt data?
 asymmetric
 sharedsecret
 publickey
 DiffieHellman
Explanation: Symmetric encryption algorithms use the same key (also called shared secret) to encrypt and decrypt the data. In contrast, asymmetric encryption algorithms (also called publickey) use a pair of keys, one for encryption and another for decryption.