CompTIA Security+ Certification Exam SY0-701 Practice Test 4 Flashcards
Which of the following answers refers to a legacy symmetric-key block cipher encryption algorithm?
A) RC4
B) DES
C) RSA
D) DSA
B) DES
Which of the answers listed below refers to a deprecated stream cipher used in some legacy applications, such as WEP?
A) RSA
B) DES
C) SSL
D) RC4
D) RC4
Which of the following answers refers to a deprecated (largely replaced by AES) symmetric-key block cipher encryption algorithm?
A) ECDSA
B) RSA
C) IDEA
D) DSA
C) IDEA
What is the recommended replacement for DES?
A)DSA
B) RSA
C) RC4
D) AES
D) AES
An IV is a random or pseudorandom value used in cryptography to ensure that the same plaintext input does not produce the same ciphertext output, even when the same encryption key is used. The IV is typically used with encryption algorithms in block cipher modes to enhance security by introducing randomness to the encryption process.
A) True
B) False
A) True
Which of the answers listed below refers to a logical operation commonly used in the context of cybersecurity, particularly in encryption and obfuscation techniques?
A) AND
B) OR
C) NOT
D) XOR
D) XOR
Which of the following answers refers to a block cipher mode that works by chaining the ciphertext blocks together, such that each ciphertext block depends on the previous block?
A) CBC
B) GCM
C) ECB
D) CFB
A) CBC
Which block mode transforms a block cipher into a stream cipher enabling the encryption of individual bits or bytes of data?
A) CFB
B) CBC
C) GCM
D) ECB
A) CFB
A block cipher mode that combines a unique counter with encryption key to generate a stream of pseudorandom data blocks which are then used for encrypting data is called:
A) CBC
B) GCM
C) CFB
D) CTM
D) CTM
Which of the block cipher modes listed below is the simplest/weakest and therefore not recommended for use?
A) CBC
B) GCM
C) ECB
D) CTM
C) ECB
Which block cipher mode combines CTM for encryption with an authentication mechanism to ensure both data confidentiality and integrity?
A) CBC
B) GCM
C) ECB
D) CFB
B) GCM
In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as key size or key length. The key length determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security.
A) True
B) False
A) True
Which AES key length provides the highest level of security?
A) 128-bit key
B) 192-bit key
C) 256-bit key
D) 320-bit key
C) 256-bit key
Which of the following answers refers to an embedded microcontroller used for secure boot, disk encryption, and system integrity verification?
A) TPM
B) SoC
C) UEFI
D) HSM
A) TPM
Which of the answers listed below refers to a piece of hardware and associated software/firmware designed to provide cryptographic and key management functions?
A) EFS
B) HSM
C) SFC
D) TPM
B) HSM