CompTIA+ Security Guide to Network Security Fundamentals: Ch. 3 Review Questions

Ace your homework & exams now with Quizwiz!

Which type of blockchain can anyone join?

Public blockchain

What is a collision?

Two files produce the same digest.

Which of the following is a weakness of RSA?

The digest produced by the RSA algorithm is too short to be secure

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice's public key

Which of these is NOT a characteristic of a secure hash algorithm?

Collisions may occur, but they are rare.

Layla has encrypted a document so that it can only be viewed by those who have been provided the key. What protection has she given to this document?

Confidentiality

Which of the following is NOT to be decrypted but is only used for comparison purposes?

Digest

Which type of encryption would protect all data on a hard drive, including the installed OS?

FDE

Farah needs to encrypt only a few files and does not want the entire disk contents to be encrypted. What type of encryption would she use?

File-level encryption

Which of the following is NOT correct about an OTP?

It requires a cipher disk

Which of the following is NOT correct about "security through obscurity"?

It should only be used as a general information security protection in extreme circumstances

Which of these is NOT true about ECC?

It uses both sloping curves and prime numbers

Zeinab has been asked by her supervisor to speak with an angry customer who claims that they never received notification of a change in the terms of service agreement. Zeinab learned that an automated "read receipt" was received, showing that the customer opened the email with the new terms of service outline. What action will Zeinab now taking regarding this customer?

Nonrepudiation

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

Plaintext

Which of the following creates the most secure ciphertext?

Sponge function

Which of the following is NOT a form of obfuscation?

Steganography

Aaliyah wants to send a message to a friend, but she does not want anyone else to know that she is communicating with them. Which technique would she use?

Stegnanography

Which algorithm uses the same key to both encrypt and decrypt data?

Symmetric cryptographic algorithm

Nahla has been asked to make a recommendation about the most secure TEE. Which of the following would she choose?

TPM

Karyme needs to select a hash algorithm that will produce the longest and most secure digest. Which would she choose?

Whirlpool


Related study sets

med surg exam 2 review questions 1

View Set

Accounting 231 - Ch. 10 LearnSmart

View Set

Market Pricing - Conducting a Competitive Pay Analysis

View Set

Biology Test - Human Anatomy and Physiology

View Set

Informatics and Quality Improvement

View Set

Chapter 4 Social Perception and Managing Diversity

View Set