These Comptia Security +: Cryptography multiple-choice questions and their answers will help you strengthen your grip on the subject of Comptia Security +: Cryptography. You can prepare for an upcoming exam or job interview with these 30 Comptia Security +: Cryptography MCQs.
So scroll down and start answering.
A. Elliptic curve
B. Digital signature
C. Hash Message Authentication Code
D. DSS
A. Encryption
B. L2TP
C. HMAC
D. RSA
A. DES
B. TPM
C. SSL
D. IPSec
A. Symmetric key algorithms
B. Secure hash algorithm
C. RSA
D. Symmetric key
A. Ciphertext
B. Digital signature
C. Integrity
D. Cipher
A. Symmetric ciphers
B. SHA-2
C. Key
D. Digital signature
A. S-HTTP
B. Stream cipher
C. Message Authentication Code
D. Digital signature
A. Asymmetric key
B. Ciphertext
C. WPA2
D. Non repudiation
A. PPTP
B. Cipher
C. Digital signature
D. X.509
A. L2TP
B. One time pad
C. HMAC
D. SSH
A. IPSec
B. Steganography
C. Plaintext
D. Confidentiality
A. Whole disk encryption
B. Secure hash algorithm
C. Digital signature
D. Integrity
A. Digital signature
B. MD5
C. TKIP
D. Tunneling protocols
A. SSL
B. TPM
C. Encryption
D. Integrity
A. Encryption
B. Stream cipher
C. PPTP
D. Asymmetric key
A. Tunneling protocols
B. Collision
C. L2TP
D. IPSec
A. PPTP
B. Triple DES
C. IPSec
D. TPM
A. SSH
B. Digital signature
C. TKIP
D. S-HTTP
A. TLS
B. Secure hash algorithm
C. Steganography
D. Hash Message Authentication Code
A. Symmetric key algorithms
B. Trusted platform module
C. Message Authentication Code
D. Unclassified data
A. DSS
B. Hybrid
C. TPM
D. IPSec
A. Digital signature
B. DSS
C. X.509
D. Asymmetric key
A. Encryption
B. Elliptic curve
C. Symmetric key algorithms
D. PG
A. Hash Message Authentication Code
B. One time pad
C. Trusted platform module
D. Non repudiation
A. SSH
B. DSS
C. Non repudiation
D. Decryption
A. Non repudiation
B. Key
C. Secure hash algorithms
D. SHA-2
A. Four modes of DES
B. IPSec
C. Ciphertext
D. S-HTTP
A. Wired equivalency privacy
B. Ciphertext
C. L2TP
D. Tunneling
A. TLS
B. DES
C. Encryption
D. S/MIME
A. DSS
B. MD5
C. Secure hash algorithm
D. Symmetric key algorithms