CompTIA Security+ Certification Exam SY0-701 Practice Test 4 Flashcards

1
Q

Which of the following answers refers to a legacy symmetric-key block cipher encryption algorithm?

A) RC4
B) DES
C) RSA
D) DSA

A

B) DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a deprecated stream cipher used in some legacy applications, such as WEP?

A) RSA
B) DES
C) SSL
D) RC4

A

D) RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refers to a deprecated (largely replaced by AES) symmetric-key block cipher encryption algorithm?

A) ECDSA
B) RSA
C) IDEA
D) DSA

A

C) IDEA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the recommended replacement for DES?

A)DSA
B) RSA
C) RC4
D) AES

A

D) AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An IV is a random or pseudorandom value used in cryptography to ensure that the same plaintext input does not produce the same ciphertext output, even when the same encryption key is used. The IV is typically used with encryption algorithms in block cipher modes to enhance security by introducing randomness to the encryption process.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the answers listed below refers to a logical operation commonly used in the context of cybersecurity, particularly in encryption and obfuscation techniques?

A) AND
B) OR
C) NOT
D) XOR

A

D) XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following answers refers to a block cipher mode that works by chaining the ciphertext blocks together, such that each ciphertext block depends on the previous block?

A) CBC
B) GCM
C) ECB
D) CFB

A

A) CBC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which block mode transforms a block cipher into a stream cipher enabling the encryption of individual bits or bytes of data?

A) CFB
B) CBC
C) GCM
D) ECB

A

A) CFB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A block cipher mode that combines a unique counter with encryption key to generate a stream of pseudorandom data blocks which are then used for encrypting data is called:

A) CBC
B) GCM
C) CFB
D) CTM

A

D) CTM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the block cipher modes listed below is the simplest/weakest and therefore not recommended for use?

A) CBC
B) GCM
C) ECB
D) CTM

A

C) ECB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which block cipher mode combines CTM for encryption with an authentication mechanism to ensure both data confidentiality and integrity?

A) CBC
B) GCM
C) ECB
D) CFB

A

B) GCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as key size or key length. The key length determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which AES key length provides the highest level of security?

A) 128-bit key
B) 192-bit key
C) 256-bit key
D) 320-bit key

A

C) 256-bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following answers refers to an embedded microcontroller used for secure boot, disk encryption, and system integrity verification?

A) TPM
B) SoC
C) UEFI
D) HSM

A

A) TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to a piece of hardware and associated software/firmware designed to provide cryptographic and key management functions?

A) EFS
B) HSM
C) SFC
D) TPM

A

B) HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following answers refers to a centralized server that is used to distribute cryptographic keys and authenticate users and services within a computer network?

A) PKI
B) RAS
C) KDC
D) NAS

A

C) KDC

17
Q

In a Kerberos-protected network, this type of secure token is granted to users during their initial login to enable them access to multiple network services without the need to re-enter their login credentials.

A) OTP
B) TGT
C) AS
D) TGS

A

B) TGT

18
Q

In cryptography and security, the term “Secure enclave” typically refers to a protected and isolated hardware or software environment within a computing device, such as a smartphone, tablet, or computer, where sensitive data and cryptographic operations can be stored and processed securely.

A) True

B) False

A

A) True

19
Q

The term “Obfuscation” is used to describe techniques employed to obscure or hide the true meaning or nature of data, making it challenging for unauthorized parties to decipher or reverse-engineer the information.

A) True

B) False

A

A) True

20
Q

What is the purpose of steganography?

A) Checking data integrity
B) Verifying hash values
C) Hiding data within another piece of data
D) Encrypting data

A

C) Hiding data within another piece of data

21
Q

In the field of data security, the term “Tokenization” refers to the process of replacing sensitive data with nonsensitive information which holds a reference to the original data and enables its processing but has no value when breached.

A) True

B) False

A

A) True

22
Q

Replacing password characters in a password field with a series of asterisks is an example of:

A) Data masking
B) Tokenization
C) Anonymization
D) Pseudo-anonymization

A

A) Data masking

23
Q

A hash function is a mathematical algorithm that maps data of arbitrary size to a fixed-size hash value, typically represented as a short string of characters. The hash function result, also known as a digest or checksum, provides a unique representation of the original data input. The functionality of hash functions relies on the fact that if there is any change to the data after the original hash was generated, the new hash value calculated after content modification will be different from the original result because hash functions are designed to be sensitive to changes in the input data.

A) True

B) False

A

A) True

24
Q

Hash functions find use in a variety of applications, including:

A) Cryptography
B) Data integrity verification
C) Password verification and storage
D) Digital signatures
E) Blockchain technology
F) All of the above

A

F) All of the above

25
Q

Which of the answers listed below refers to a cryptographic hash function that has been widely used in the past but is now considered deprecated for security-sensitive applications due to known vulnerabilities?

A) MD5
B) SHA
C) CRC
D) HMAC

A

A) MD5