Option A is correct. Only asymmetric encryption actually uses a separate public and private key pair, like RSA or ECC. Symmetric (B) always just has one secret shared between both sides. Pretty sure exam reports confirm this logic but open to debate if someone has seen it otherwise.
Q: 1
[Security Concepts]
What are two DDoS attack categories? (Choose two)
Options
Discussion
B/D. Both are actual DDoS attack types, not seeing any Cisco books mention sequential or screen-based.
I think B and D, database is a distractor here since that's not a real DDoS attack category.
Symmetric can't be called public key, only asymmetric uses public/private keys. A, not B.
B. but isn't symmetric sometimes called public if both parties know the key?
B/D. Similar question came up in the official guide and practice test.
A is wrong, B and D. Only protocol and volume-based are real DDoS categories.
Yeah, protocol and volume-based (B and D) are definitely real DDoS categories. Others like database or screen-based don't fit standard classifications. Pretty sure that's what Cisco wants here, let me know if you see it differently.
B and D tbh. Protocol and volume-based are actually recognized DDoS categories, unlike database which is just a decoy here. Saw similar on other practice sets, so pretty confident.
B. not C. Database isn't a DDoS category, protocol and volume-based are.
Be respectful. No spam.
Question 1 of 35