CompTIA+ Security Guide to Network Security Fundamentals: Ch. 3 Review Questions
Which type of blockchain can anyone join?
Public blockchain
What is a collision?
Two files produce the same digest.
Which of the following is a weakness of RSA?
The digest produced by the RSA algorithm is too short to be secure
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Alice's public key
Which of these is NOT a characteristic of a secure hash algorithm?
Collisions may occur, but they are rare.
Layla has encrypted a document so that it can only be viewed by those who have been provided the key. What protection has she given to this document?
Confidentiality
Which of the following is NOT to be decrypted but is only used for comparison purposes?
Digest
Which type of encryption would protect all data on a hard drive, including the installed OS?
FDE
Farah needs to encrypt only a few files and does not want the entire disk contents to be encrypted. What type of encryption would she use?
File-level encryption
Which of the following is NOT correct about an OTP?
It requires a cipher disk
Which of the following is NOT correct about "security through obscurity"?
It should only be used as a general information security protection in extreme circumstances
Which of these is NOT true about ECC?
It uses both sloping curves and prime numbers
Zeinab has been asked by her supervisor to speak with an angry customer who claims that they never received notification of a change in the terms of service agreement. Zeinab learned that an automated "read receipt" was received, showing that the customer opened the email with the new terms of service outline. What action will Zeinab now taking regarding this customer?
Nonrepudiation
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
Plaintext
Which of the following creates the most secure ciphertext?
Sponge function
Which of the following is NOT a form of obfuscation?
Steganography
Aaliyah wants to send a message to a friend, but she does not want anyone else to know that she is communicating with them. Which technique would she use?
Stegnanography
Which algorithm uses the same key to both encrypt and decrypt data?
Symmetric cryptographic algorithm
Nahla has been asked to make a recommendation about the most secure TEE. Which of the following would she choose?
TPM
Karyme needs to select a hash algorithm that will produce the longest and most secure digest. Which would she choose?
Whirlpool