Comptia Security +: Cryptography MCQs

Comptia Security +: Cryptography MCQs

These Comptia Security +: Cryptography multiple-choice questions and their answers will help you strengthen your grip on the subject of Comptia Security +: Cryptography. You can prepare for an upcoming exam or job interview with these 30 Comptia Security +: Cryptography MCQs.
So scroll down and start answering.

1: Encrypting a message's hash value with a private key - DOES NOT ensure confidentiality

A.   Elliptic curve

B.   Digital signature

C.   Hash Message Authentication Code

D.   DSS

2: Mechanism for message authentication that uses one of two algorithms (SHA-1 or MDF5) in combination with a shared secret key - also known as keyed hashing

A.   Encryption

B.   L2TP

C.   HMAC

D.   RSA

3: Protects against removing or installing a bogus hard drive using sealing (measuring system variables - BIOS - boot sector - firmware)

A.   DES

B.   TPM

C.   SSL

D.   IPSec

4: Based on use of one private/secret key - does NOT provide authentication or nonrepudiation - uses MAC

A.   Symmetric key algorithms

B.   Secure hash algorithm

C.   RSA

D.   Symmetric key

5: Encrypted text - also called cryptogram

A.   Ciphertext

B.   Digital signature

C.   Integrity

D.   Cipher

6: Sequence of bits used in encryption and decryption - also known as cryptovariable

A.   Symmetric ciphers

B.   SHA-2

C.   Key

D.   Digital signature

7: A cryptographic checksum used to provide integrity in symmetric key cryptography

A.   S-HTTP

B.   Stream cipher

C.   Message Authentication Code

D.   Digital signature

8: Based on two keys - public and private - one-way function: a key cannot decrypt what it encrypts - provides confidentiality - authentication - integrity - and nonrepudiation - Discovered by Diffie and Hellman - also known as public key

A.   Asymmetric key

B.   Ciphertext

C.   WPA2

D.   Non repudiation

9: Method of encryption and decryption

A.   PPTP

B.   Cipher

C.   Digital signature

D.   X.509

10: Tunneling protocol that merges PPTP with L2F - using port 1701 - is used over UDP - can be combined with IPSec for 5 layered encapsulation

A.   L2TP

B.   One time pad

C.   HMAC

D.   SSH

11: Symmetric cryptography - asymmetric cryptography - and hashes provide __________

A.   IPSec

B.   Steganography

C.   Plaintext

D.   Confidentiality

12: Symmetric cryptography with MAC - asymmetric cryptography - and hashes provide __________

A.   Whole disk encryption

B.   Secure hash algorithm

C.   Digital signature

D.   Integrity

13: PPTP - L2TP - IPSec - and SSH

A.   Digital signature

B.   MD5

C.   TKIP

D.   Tunneling protocols

14: Process of transforming plaintext into unreadable format

A.   SSL

B.   TPM

C.   Encryption

D.   Integrity

15: . Cryptographic algorithm that operates on plaintext - one bit at a time - and enciphers with a random generated "key stream" using substitution

A.   Encryption

B.   Stream cipher

C.   PPTP

D.   Asymmetric key

16: Two different pieces of data have the same hash value

A.   Tunneling protocols

B.   Collision

C.   L2TP

D.   IPSec

17: A protocol suite for securing network connections using IKE - AH - and ESP

A.   PPTP

B.   Triple DES

C.   IPSec

D.   TPM

18: For encrypting web communications - uses Cryptographic Messaging Syntax (CMS) to protect individual message and response

A.   SSH

B.   Digital signature

C.   TKIP

D.   S-HTTP

19: A cryptographic protocol that provides security for communications over networks such as the Internet - more secure that SSL

A.   TLS

B.   Secure hash algorithm

C.   Steganography

D.   Hash Message Authentication Code

20: A secure cryptoprocessor embedded in the motherboard used to authenticate a hardware device - TPM stands for

A.   Symmetric key algorithms

B.   Trusted platform module

C.   Message Authentication Code

D.   Unclassified data

21: Digital signature standard that uses 2 algorithms: RSA and DSA (based on El Gamal) - both use the Secure Hash Standard (SHA-1)

A.   DSS

B.   Hybrid

C.   TPM

D.   IPSec

22: Provides integrity - authentication - and non-repudiation by encrypting a message digest with a private key

A.   Digital signature

B.   DSS

C.   X.509

D.   Asymmetric key

23: Free email security program that uses several algorithms - symmetric (IDEA) - asymmetric (RSA) and hashes (SHA1) and the web of trust

A.   Encryption

B.   Elliptic curve

C.   Symmetric key algorithms

D.   PG

24: HMAC stands for...

A.   Hash Message Authentication Code

B.   One time pad

C.   Trusted platform module

D.   Non repudiation

25: Tunneling protocol originally used on UNIX - uses port 22 - typically used for remote administration - replaces telnet and FTP

A.   SSH

B.   DSS

C.   Non repudiation

D.   Decryption

26: Asymmetric cryptography - hashes - and digital signatures provide __________

A.   Non repudiation

B.   Key

C.   Secure hash algorithms

D.   SHA-2

27: Cipher block chaining (CBC) - cipher feedback (CFB) - electronic code book (ECB) and output feedback (OFB)

A.   Four modes of DES

B.   IPSec

C.   Ciphertext

D.   S-HTTP

A.   Wired equivalency privacy

B.   Ciphertext

C.   L2TP

D.   Tunneling

29: Encryption standard broken in 1998 - has a relatively short key length

A.   TLS

B.   DES

C.   Encryption

D.   S/MIME

30: Pads messages to a length of 512 bits - then compresses to generate a 128 bit hash value

A.   DSS

B.   MD5

C.   Secure hash algorithm

D.   Symmetric key algorithms