Ensurepass

QUESTION 341

Which three statements about the RSA algorithm are true? (Choose three.)

 

A.

The RSA algorithm provides encryption but not authentication.

B.

The RSA algorithm provides authentication but not encryption.

C.

The RSA algorithm creates a pair of public-private keys that are shared by entities that perform encryption.

D.

The private key is never sent across after it is generated.

E.

The public key is used to decrypt the message that was encrypted by the private key.

F.

The private key is used to decrypt the message that was encrypted by the public key.

 

Correct Answer: CDF

 

 

QUESTION 342

Which two statements about the MD5 Hash are true? (Choose two.)

 

A.

Length of the hash value varies with the length of the message that is being hashed.

B.

Every unique message has a unique hash value.

C.

Its mathematically possible to find a pair of message that yield the same hash value.

D.

MD5 always yields a different value for the same message if repeatedly hashed.

E.

The hash value cannot be used to discover the message.

 

Correct Answer: BE

 

 

QUESTION 343

Which two statements about the SHA-1 algorithm are true? (Choose two)

 

A.

The SHA-1 algorithm is considered secure because it always produces a unique hash for the same message.

B.

The SHA-1 algorithm takes input message of any length and produces 160-bit hash output.

C.

The SHA-1 algorithm is considered secure because it is possible to find a message from its hash.

D.

The purpose of the SHA-1 algorithm is to provide data confidentiality.

E.

The purpose of the SHA-1 algorithm is to provide data authenticity.

 

Correct Answer: BE

 

 

QUESTION 344

Which two statements about the DES algorithm are true? (Choose two)

 

A.

The DES algorithm is based on asymmetric cryptography.

B.

The DES algorithm is a stream cipher.

C.

The DES algorithm is based on symmetric cryptography.

D.

The DES algorithm encrypts a block of 128 bits.

E.

The DES algorithm uses a 56-bit key.

 

Correct Answer: CE

 

 

QUESTION 345

Which statement about the 3DES algorithm is true?

 

A.

The 3DES algorithm uses the same key for encryption and decryption,

B.

The 3DES algorithm uses a public-private key pair with a public key for encryption and a private key for decryption.

C.

The 3DES algorithm is a block cipher.

D.

The 3DES algorithm uses a key length of 112 bits.

E.

The 3DES algorithm is faster than DES due to the shorter key length.

 

Correct Answer: C

 

 

QUESTION 346

Which two statements about the DH group are true? (Choose two.)

 

A.

The DH group is used to provide data authentication.

B.

The DH group is negotiated in IPsec phase-1.

C.

The DH group is used to provide data confidentiality.

D.

The DH group is used to establish a shared key over an unsecured medium.

E.

The DH group is negotiated in IPsec phase-2.

 

Correct Answer: BD

 

 

QUESTION 347

Which statement describes the computed authentication data in the AH protocol?

 

A.

The computed authentication data is never sent across.

B.

The computed authentication data is part of a new IP header.

C.

The computed authentication data is part of the AH header.

D.

The computed authentication data is part of the original IP header.

 

Correct Answer: C

 

 

QUESTION 348

Which statement about the AH is true?

 

A.

AH authenticates only the data.

B.

AH authenticates only the IP header.

C.

AH authenticates only the TCP-UDP header.

D.

AH authenticates the entire packet and any mutable fields.

E.

AH authenticates the entire packet except for any mutable fields.

 

Correct Answer: E

 

 

QUESTION 349

Which three fields are part of the AH header? (Choose three.)

 

A.

Source Address

B.

Destination Address

C.

Packet ICV

D.

Protocol ID

E.

Application Port

F.

SPI identifying SA

G.

Payload Data Type Identifier

 

Correct Answer: CFG

 

QUESTION 350

Which statement about the HTTP protocol is true?

 

A.

The request method does not include the protocol version.

B.

The proxy acts as an intermediary receiving agent in the request-response chain.

C.

The tunnel acts as an intermediary relay agent in the request-response chain.

D.

The gateway acts as an intermediary forwarding agent in the request-response chain.

E.

The success and error codes are returned in the response message by the user-agent.

 

Correct Answer: C

 

Free VCE & PDF File for Cisco 350-018 Practice Tests

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

Comments are closed.