QUESTION 341
Which three statements about the RSA algorithm are true? (Choose three.)
A. |
The RSA algorithm provides encryption but not authentication. |
B. |
The RSA algorithm provides authentication but not encryption. |
C. |
The RSA algorithm creates a pair of public-private keys that are shared by entities that perform encryption. |
D. |
The private key is never sent across after it is generated. |
E. |
The public key is used to decrypt the message that was encrypted by the private key. |
F. |
The private key is used to decrypt the message that was encrypted by the public key. |
Correct Answer: CDF
QUESTION 342
Which two statements about the MD5 Hash are true? (Choose two.)
A. |
Length of the hash value varies with the length of the message that is being hashed. |
B. |
Every unique message has a unique hash value. |
C. |
Its mathematically possible to find a pair of message that yield the same hash value. |
D. |
MD5 always yields a different value for the same message if repeatedly hashed. |
E. |
The hash value cannot be used to discover the message. |
Correct Answer: BE
QUESTION 343
Which two statements about the SHA-1 algorithm are true? (Choose two)
A. |
The SHA-1 algorithm is considered secure because it always produces a unique hash for the same message. |
B. |
The SHA-1 algorithm takes input message of any length and produces 160-bit hash output. |
C. |
The SHA-1 algorithm is considered secure because it is possible to find a message from its hash. |
D. |
The purpose of the SHA-1 algorithm is to provide data confidentiality. |
E. |
The purpose of the SHA-1 algorithm is to provide data authenticity. |
Correct Answer: BE
QUESTION 344
Which two statements about the DES algorithm are true? (Choose two)
A. |
The DES algorithm is based on asymmetric cryptography. |
B. |
The DES algorithm is a stream cipher. |
C. |
The DES algorithm is based on symmetric cryptography. |
D. |
The DES algorithm encrypts a block of 128 bits. |
E. |
The DES algorithm uses a 56-bit key. |
Correct Answer: CE
QUESTION 345
Which statement about the 3DES algorithm is true?
A. |
The 3DES algorithm uses the same key for encryption and decryption, |
B. |
The 3DES algorithm uses a public-private key pair with a public key for encryption and a private key for decryption. |
C. |
The 3DES algorithm is a block cipher. |
D. |
The 3DES algorithm uses a key length of 112 bits. |
E. |
The 3DES algorithm is faster than DES due to the shorter key length. |
Correct Answer: C
QUESTION 346
Which two statements about the DH group are true? (Choose two.)
A. |
The DH group is used to provide data authentication. |
B. |
The DH group is negotiated in IPsec phase-1. |
C. |
The DH group is used to provide data confidentiality. |
D. |
The DH group is used to establish a shared key over an unsecured medium. |
E. |
The DH group is negotiated in IPsec phase-2. |
Correct Answer: BD
QUESTION 347
Which statement describes the computed authentication data in the AH protocol?
A. |
The computed authentication data is never sent across. |
B. |
The computed authentication data is part of a new IP header. |
C. |
The computed authentication data is part of the AH header. |
D. |
The computed authentication data is part of the original IP header. |
Correct Answer: C
QUESTION 348
Which statement about the AH is true?
A. |
AH authenticates only the data. |
B. |
AH authenticates only the IP header. |
C. |
AH authenticates only the TCP-UDP header. |
D. |
AH authenticates the entire packet and any mutable fields. |
E. |
AH authenticates the entire packet except for any mutable fields. |
Correct Answer: E
QUESTION 349
Which three fields are part of the AH header? (Choose three.)
A. |
Source Address |
B. |
Destination Address |
C. |
Packet ICV |
D. |
Protocol ID |
E. |
Application Port |
F. |
SPI identifying SA |
G. |
Payload Data Type Identifier |
Correct Answer: CFG
QUESTION 350
Which statement about the HTTP protocol is true?
A. |
The request method does not include the protocol version. |
B. |
The proxy acts as an intermediary receiving agent in the request-response chain. |
C. |
The tunnel acts as an intermediary relay agent in the request-response chain. |
D. |
The gateway acts as an intermediary forwarding agent in the request-response chain. |
E. |
The success and error codes are returned in the response message by the user-agent. |
Correct Answer: C
Free VCE & PDF File for Cisco 350-018 Practice Tests
Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …