Implementing and Operating Cisco Security Core Technologies (SCOR) Quiz Questions and Answers

What are two default Cisco IOS privilege levels? (Choose two.)

Answer :
  • 1
  • 15

Which countermeasure can an organization employ to improve the confidentiality of data that is transmitted by users and devices?

Answer :
  • Use encyption between sending and receiving parties

Which two options might be considered attack surfaces in the network environment?

Answer :
  • Open ports
  • Use of Telnet

Which description of the AES encryption algorithm is true?

Answer :
  • lt uses the block of 128 bits

VPNs use encryption techniques to maintain security and privacy that communicate remotely via a public network.

Answer :
  • True

What type of VPNs are used for home private and secure connectivity?

Answer :
  • Remote access VPNs

For a secure connection, what do remote access VPNs rely on?

Answer :
  • IPSec, SSL

What does CHAP stand for?

Answer :
  • Challenge handshake authentication protocol

_____ means the protection of data from modification by unknown users.

Answer :
  • Integrity

Which profiling probe collects the user-agent string?

Answer :
  • HTTP