CompTIA Security+ Certification Exam SY0-701 Practice Test 3 Flashcards
The MIME specification extends the email message format beyond plain text, enabling the transfer of graphics, audio, and video files over the Internet mail system. S/MIME is an enhanced version of the MIME protocol that enables email security features by providing encryption, authentication, message integrity, and other related services.
A) True
B) False
A) True
What is the name of a network protocol that enables secure file transfer over SSH?
A) TFTP
B) SFTP
C) Telnet
D) FTPS
B) SFTP
SFTP is an extension of the FTP protocol that adds support for SSL/TLS encryption
A) True
B) False
B) False
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as?
A) RDP
B) SSH
C) Telnet
D) SCP
B) SSH
Which of the answers listed below refers to a suite of protocols and technologies providing encryption, authentication, and data integrity for network traffic?
A) TLS
B) SSH
C) IPsec
D) VPN
C) IPsec
Which part of IPsec provides authentication, integrity, and confidentiality?
A) SPD
B) PFS
C) AH
D) ESP
D) ESP
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:
A) WWAN
B) VPN
C) PAN
D) VLAN
B) VPN
Which protocol enables secure, real-time delivery of audio and video over an IP network?
A) S/MIME
B) RTP
C) SIP
D) SRTP
D) SRTP
An encryption protocol primarily used in Wi-Fi networks implementing the WPA2 security standard is called:
A) TKIP
B) CCMP
C) SSL
D) IPsec
B) CCMP
A security protocol designed to improve the security of existing WEP implementations is known as:
A) WPA2
B) RC4
C) CCMP
D) TKIP
Which of the following answers refer(s) to deprecated/insecure encryption protocols and cryptographic hash functions? (Select all that apply)
A) DES
B) AES-256
C) MD5
D) ECC
E) SHA-1
F) SSL
G) RC4
A) DES
C) MD5
E) SHA-1
F) SSL
G) RC4
Which cryptographic protocol is designed to provide secure communications over a computer network and is the successor to SSL?
A) IPsec
B) TLS
C) AES
D) CCMP
B) TLS
Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption).
A) True
B) False
B) False
In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa).
A) True
B) False
A) True
Which of the algorithms listed below are not symmetric ciphers? (Select 3 answers)
A) AES
B) DES
C) DHE
D) ECC
E) IDEA
F) RC4
G) RSA
C) DHE
D) ECC
G) RSA