CompTIA Security+ Certification Exam SY0-701 Practice Test 5 Flashcards
Which of the following answers refers to a family of cryptographic hash functions designed for various security-related applications, including digital signatures, password storage, secure communications, and data integrity verification?
A) RSA
B) AES
C) PKCS
D) SHA
D) SHA
Which of the hash functions listed below offers the highest level of security?
A) MD5
B) SHA-3
C) RIPEMD-160
D) HMAC
B) SHA-3
Which of the following combines a cryptographic hash function with a secret key to provide a means of verifying both the authenticity and integrity of a message or data?
A) MD5
B) DSA
C) HMAC
D) DES
C) HMAC
Which of the answers listed below refers to a non-cryptographic hash function often used for error-checking purposes?
A) MD5
B) CRC
C) SHA
D) RIPEMD
B) CRC
Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks?
A) Seed
B) IV
C) Salt
D) Shim
C) Salt
A pseudo-random data added to a password before hashing is referred to as:
A) Seed
B) IV
C) Salt
D) Shim
C) Salt
Which cryptographic technique is used to prevent the effectiveness of rainbow tables in cracking hashed passwords?
A) Data masking
B) Two-Factor Authentication (2FA)
C) Key stretching
D) Salting
D) Salting
Which of the answers listed below refers to a cryptographic technique that verifies the authenticity and integrity of digital documents or messages by using a unique encrypted identifier from the sender?
A) Digital signature
B) Cryptographic hash function
C) Digital certificate
D) Asymmetric encryption
A) Digital signature
Which of the following answers refer to algorithms used for generating and verifying digital signatures? (Select 3 answers)
A) ECDSA
B) RSA
C) ECDHE
D) DSA
E) GPG/PGP
A) ECDSA
B) RSA
D) DSA
Which of the answers listed below refer to DSA? (Select 3 answers)
A) Asymmetric algorithm
B) Used for the key exchange process
C) Symmetric algorithm
D) Provides authentication, integrity, and non-repudiation
E) Specifically designed for creating and verifying digital signatures
F) Used for encryption
A) Asymmetric algorithm
D) Provides authentication, integrity, and non-repudiation
E) Specifically designed for creating and verifying digital signatures
Which of the following answers refer to the characteristic features of RSA? (Select 3 answers)
A) Asymmetric encryption algorithm
B) A public key used for encryption and a private key used for decryption
C) Suitable for bulk data encryption
D) Used for secure communications, digital signatures, and key exchange
E) Symmetric encryption algorithm
F) A single key used for both encryption and decryption
A) Asymmetric encryption algorithm
B) A public key used for encryption and a private key used for decryption
D) Used for secure communications, digital signatures, and key exchange
Which of the answers listed below describe(s) the characteristics of ECDSA? (Select all that apply)
A) Provides authentication, integrity, and non-repudiation
B) Based on elliptic curve cryptography
C) Designed for data encryption
D) Specifically designed for creating and verifying digital signatures
E) More computationally efficient than other signature algorithms
F) Enables the key exchange process
A) Provides authentication, integrity, and non-repudiation
B) Based on elliptic curve cryptography
D) Specifically designed for creating and verifying digital signatures
E) More computationally efficient than other signature algorithms
Given the computational limitations of IoT devices, smartcards, and mobile devices, which of the following digital signature algorithms would be the most efficient choice due to its smaller key size and lower processing requirements?
A) RSA
B) ECDHE
C) DSA
D) ECDSA
E) ECC
D) ECDSA
Key stretching is a cryptographic technique that enhances the security of sensitive data, such as cryptographic keys and passwords. It works by repeatedly applying a resource-intensive function or algorithm to the input data, thus increasing the computational effort required to derive the original key or password, which makes the data more resistant to brute-force, dictionary, or rainbow table attacks.
A) True
B) False
A) True
Which of the following is an example of a key stretching algorithm?
A) RIPEMD
B) SHA
C) HMAC
D) PBKDF2
D) PBKDF2