CompTIA Security+ Certification Exam SY0-701 Practice Test 5 Flashcards

1
Q

Which of the following answers refers to a family of cryptographic hash functions designed for various security-related applications, including digital signatures, password storage, secure communications, and data integrity verification?

A) RSA
B) AES
C) PKCS
D) SHA

A

D) SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the hash functions listed below offers the highest level of security?

A) MD5
B) SHA-3
C) RIPEMD-160
D) HMAC

A

B) SHA-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following combines a cryptographic hash function with a secret key to provide a means of verifying both the authenticity and integrity of a message or data?

A) MD5
B) DSA
C) HMAC
D) DES

A

C) HMAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the answers listed below refers to a non-cryptographic hash function often used for error-checking purposes?

A) MD5
B) CRC
C) SHA
D) RIPEMD

A

B) CRC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks?

A) Seed
B) IV
C) Salt
D) Shim

A

C) Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A pseudo-random data added to a password before hashing is referred to as:

A) Seed
B) IV
C) Salt
D) Shim

A

C) Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which cryptographic technique is used to prevent the effectiveness of rainbow tables in cracking hashed passwords?

A) Data masking
B) Two-Factor Authentication (2FA)
C) Key stretching
D) Salting

A

D) Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the answers listed below refers to a cryptographic technique that verifies the authenticity and integrity of digital documents or messages by using a unique encrypted identifier from the sender?

A) Digital signature
B) Cryptographic hash function
C) Digital certificate
D) Asymmetric encryption

A

A) Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following answers refer to algorithms used for generating and verifying digital signatures? (Select 3 answers)

A) ECDSA
B) RSA
C) ECDHE
D) DSA
E) GPG/PGP

A

A) ECDSA
B) RSA
D) DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the answers listed below refer to DSA? (Select 3 answers)

A) Asymmetric algorithm
B) Used for the key exchange process
C) Symmetric algorithm
D) Provides authentication, integrity, and non-repudiation
E) Specifically designed for creating and verifying digital signatures
F) Used for encryption

A

A) Asymmetric algorithm
D) Provides authentication, integrity, and non-repudiation
E) Specifically designed for creating and verifying digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refer to the characteristic features of RSA? (Select 3 answers)

A) Asymmetric encryption algorithm
B) A public key used for encryption and a private key used for decryption
C) Suitable for bulk data encryption
D) Used for secure communications, digital signatures, and key exchange
E) Symmetric encryption algorithm
F) A single key used for both encryption and decryption

A

A) Asymmetric encryption algorithm
B) A public key used for encryption and a private key used for decryption
D) Used for secure communications, digital signatures, and key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below describe(s) the characteristics of ECDSA? (Select all that apply)

A) Provides authentication, integrity, and non-repudiation
B) Based on elliptic curve cryptography
C) Designed for data encryption
D) Specifically designed for creating and verifying digital signatures
E) More computationally efficient than other signature algorithms
F) Enables the key exchange process

A

A) Provides authentication, integrity, and non-repudiation
B) Based on elliptic curve cryptography
D) Specifically designed for creating and verifying digital signatures
E) More computationally efficient than other signature algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Given the computational limitations of IoT devices, smartcards, and mobile devices, which of the following digital signature algorithms would be the most efficient choice due to its smaller key size and lower processing requirements?

A) RSA
B) ECDHE
C) DSA
D) ECDSA
E) ECC

A

D) ECDSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key stretching is a cryptographic technique that enhances the security of sensitive data, such as cryptographic keys and passwords. It works by repeatedly applying a resource-intensive function or algorithm to the input data, thus increasing the computational effort required to derive the original key or password, which makes the data more resistant to brute-force, dictionary, or rainbow table attacks.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an example of a key stretching algorithm?

A) RIPEMD
B) SHA
C) HMAC
D) PBKDF2

A

D) PBKDF2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The term “Open public ledger” is used to describe a distributed database stored across multiple computers in a P2P network.

A) True

B) False

A

A) True

17
Q

Blockchain technology is an example of:

A) Online payment gateway
B) Centralized database
C) Open public ledger
D) Cloud storage system

A

C) Open public ledger

18
Q

Which of the answers listed below refers to a set of standards and specifications that define various cryptographic techniques, including formats for public keys, private keys, digital signatures, and digital certificates?

A) ITIL
B) RFC
C) PKCS
D) ISO/IEC

A

C) PKCS

19
Q

Which of the following defines a file format for storing and exchanging personal identity information, including private keys and digital certificates?

A) P10
B) P11
C) P12
D) P13

A

C) P12

20
Q

A type of digital document that verifies the identity of an individual, device, service, or organization in online communications is known as:

A) Encryption key
B) Digital certificate
C) Identity token
D) Digital signature

A

B) Digital certificate

21
Q

What is the role of Registration Authority (RA) in PKI? (Select 2 answers)

A) Accepting requests for digital certificates
B) Validating digital certificates
C) Authenticating the entity making the request
D) Providing backup source for cryptographic keys
E) Issuing digital certificates

A

A) Accepting requests for digital certificates
C) Authenticating the entity making the request

22
Q

Which of the answers listed below refers to a trusted third party responsible for issuing, revoking, and managing digital certificates?

A) RA
B) DN
C) CA
D) CSP

A

C) CA

23
Q

Which of the following answers refers to a means for periodic publication of all digital certificates that have been revoked?

A) CRL
B) OSPF
C) RA
D) CSR

A

A) CRL

24
Q

Which of the answers listed below refers to a protocol that enables on-demand querying of the revocation status of a digital certificate?

A) CSP
B) OCSP
C) DN
D) CRL

A

B) OCSP

25
Q

What is the fastest way to check the validity of a single digital certificate?

A) CSR
B) DN
C) CRL
D) OCSP

A

D) OCSP