CompTIA Security+ Certification Exam SY0-701 Practice Test 3 Flashcards

1
Q

The MIME specification extends the email message format beyond plain text, enabling the transfer of graphics, audio, and video files over the Internet mail system. S/MIME is an enhanced version of the MIME protocol that enables email security features by providing encryption, authentication, message integrity, and other related services.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name of a network protocol that enables secure file transfer over SSH?

A) TFTP
B) SFTP
C) Telnet
D) FTPS

A

B) SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SFTP is an extension of the FTP protocol that adds support for SSL/TLS encryption

A) True

B) False

A

B) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as?

A) RDP
B) SSH
C) Telnet
D) SCP

A

B) SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the answers listed below refers to a suite of protocols and technologies providing encryption, authentication, and data integrity for network traffic?

A) TLS
B) SSH
C) IPsec
D) VPN

A

C) IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which part of IPsec provides authentication, integrity, and confidentiality?

A) SPD
B) PFS
C) AH
D) ESP

A

D) ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:

A) WWAN
B) VPN
C) PAN
D) VLAN

A

B) VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol enables secure, real-time delivery of audio and video over an IP network?

A) S/MIME
B) RTP
C) SIP
D) SRTP

A

D) SRTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An encryption protocol primarily used in Wi-Fi networks implementing the WPA2 security standard is called:

A) TKIP
B) CCMP
C) SSL
D) IPsec

A

B) CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security protocol designed to improve the security of existing WEP implementations is known as:

A) WPA2
B) RC4
C) CCMP
D) TKIP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refer(s) to deprecated/insecure encryption protocols and cryptographic hash functions? (Select all that apply)

A) DES
B) AES-256
C) MD5
D) ECC
E) SHA-1
F) SSL
G) RC4

A

A) DES
C) MD5
E) SHA-1
F) SSL
G) RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which cryptographic protocol is designed to provide secure communications over a computer network and is the successor to SSL?

A) IPsec
B) TLS
C) AES
D) CCMP

A

B) TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption).

A) True

B) False

A

B) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa).

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the algorithms listed below are not symmetric ciphers? (Select 3 answers)

A) AES
B) DES
C) DHE
D) ECC
E) IDEA
F) RC4
G) RSA

A

C) DHE
D) ECC
G) RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following algorithms does not fall into the category of asymmetric encryption? (Select all that apply)

A) AES
B) DES
C) DHE
D) ECC
E) IDEA
F) RC4
G) RSA

A

A) AES
B) DES
E) IDEA
F) RC4

17
Q

The term “KEK” refers to a type of cryptographic key often used in key management systems to add an additional layer of security when encrypting and decrypting other cryptographic keys.

A) True

B) False

A

A) True

18
Q

Which of the answers listed below refers to a shared secret authentication method used in WPA, WPA2, and EAP?

A) PSK
B) 802.1X
C) SAE
D) TKIP

A

A)PSK

19
Q

Which of the following answers refers to a protocol used to set up secure connections and exchange of cryptographic keys in IPsec VPNs?

A) SSL
B) IKE
C) ESP
D) DHE

A

B) IKE

20
Q

Which of the answers listed below refers to a key exchange protocol that generates temporary keys for each session, providing forward secrecy to protect past and future communications?

A) PFS
B) SHA
C) PGP
D) DHE

A

D) DHE

21
Q

Which of the following answers refers to a cryptographic key exchange protocol that leverages ECC for enhanced security and efficiency?

A) IKE
B) ECDHE
C) DHE
D) ECDSA

A

B) ECDHE

22
Q

Which of the answers listed below refers to a solution designed to strengthen the security of session keys?

A) ECB
B) PFS
C) EFS
D) PFX

A

B) PFS

23
Q

Which of the following answers refers to a public-key cryptosystem used for digital signatures, secure key exchange, and encryption?

A) ECC
B) RSA
C) PKI
D) DSA

A

B) RSA

24
Q

Which cryptographic solution would be best suited for low-power devices, such as IoT devices, embedded systems, and mobile devices?

A) ECC
B) DES
C) RSA
D) AES

A

B) DES

25
Q

Which of the cryptographic algorithms listed below is the least vulnerable to attacks?

A) AES
B) DES
C) RC4
D) 3DES

A

A) AES