CompTIA JK0-022 Security Cryptography Certification Exam Set 3

Which of the following ports should be opened on a firewall to allow for NetBIOS communication? (Select TWO)


Options are :

  • 139 (Correct)
  • 143
  • 443
  • 161
  • 137 (Correct)
  • 110

Answer : 139 137

Which of the following concepts is used by digital signatures to ensure integrity of the data?


Options are :

  • Key escrow
  • Hashing (Correct)
  • Non-repudiation
  • Transport encryption

Answer : Hashing

Which of the following concepts is enforced by certifying that email communications have been sent by who the message says it has been sent by?


Options are :

  • Multifactor authentication
  • Non-repudiation (Correct)
  • Key escrow
  • Hashing

Answer : Non-repudiation

Which of the following must a user implement if they want to send a secret message to a coworker by embedding it within an image?


Options are :

  • Transport encryption
  • Hashing
  • Digital signature
  • Steganography (Correct)

Answer : Steganography

Which of the following ports should be opened on a firewall to allow for NetBIOS communication? (Select TWO).


Options are :

  • 161
  • 443
  • 143
  • 137 (Correct)
  • 139 (Correct)
  • 110

Answer : 137 139

Which of the following is true about asymmetric encryption?


Options are :

  • A message encrypted with the private key can be decrypted by the same key
  • A message encrypted with the public key can be decrypted with a shared key.
  • A message encrypted with the public key can be decrypted with the private key. (Correct)
  • A message encrypted with a shared key, can be decrypted by the same key.

Answer : A message encrypted with the public key can be decrypted with the private key.

A company uses PGP to ensure that sensitive email is protected. Which of the following types of cryptography is being used here for the key exchange?


Options are :

  • Symmetric (Correct)
  • Hashing
  • Session-based
  • Asymmetric

Answer : Symmetric

Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server?


Options are :

  • TLS (Correct)
  • SSLv2
  • RSA
  • SSHv1

Answer : TLS

The IT department has installed new wireless access points but discovers that the signal extends far into the parking lot. Which of the following actions should be taken to correct this?


Options are :

  • Implement WEP encryption on the access points
  • Disable the SSID broadcasting
  • Configure the access points so that MAC filtering is not used
  • Lower the power for office coverage only (Correct)

Answer : Lower the power for office coverage only

In order to securely communicate using PGP, the sender of an email must do which of the following when sending an email to a recipient for the first time?


Options are :

  • Import the recipients private key
  • Import the recipients public key (Correct)
  • Export the senders private key
  • Export the senders public key

Answer : Import the recipients public key

Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session?


Options are :

  • SFTP
  • TLS (Correct)
  • TFTP
  • HTTPS

Answer : TLS

A security technician is attempting to access a wireless network protected with WEP. The technician does not know any information about the network. Which of the following should the technician do to gather information about the configuration of the wireless network?


Options are :

  • Capture client to access point disassociation packets to replay on the local PCs loopback
  • Perform a dictionary attack on the access point to enumerate the WEP key
  • Ping the access point to discover the SSID of the network
  • Spoof the MAC address of an observed wireless network client (Correct)

Answer : Spoof the MAC address of an observed wireless network client

A security administrator discovers an image file that has several plain text documents hidden in the file. Which of the following security goals is met by camouflaging data inside of other files?


Options are :

  • Confidentiality
  • Availability
  • Integrity
  • Steganography (Correct)

Answer : Steganography

A security administrator discovers an image file that has several plain text documents hidden in the file. Which of the following security goals is met by camouflaging data inside of other files?


Options are :

  • Confidentiality
  • Availability
  • Steganography (Correct)
  • Integrity

Answer : Steganography

Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server?


Options are :

  • SSLv2
  • RSA
  • TLS (Correct)
  • SSHv1

Answer : TLS

Which of the following must a user implement if they want to send a secret message to a coworker by embedding it within an image?


Options are :

  • Steganography (Correct)
  • Transport encryption
  • Digital signature
  • Hashing

Answer : Steganography

Symmetric encryption utilizes __________, while asymmetric encryption utilizes _________.


Options are :

  • Public keys, one time
  • Private keys, session keys
  • Private keys, public keys (Correct)
  • Shared keys, private keys

Answer : Private keys, public keys

Matt, a security analyst, needs to select an asymmetric encryption method that allows for the same level of encryption strength with a lower key length than is typically necessary. Which of the following encryption methods offers this capability?


Options are :

  • Twofish
  • Diffie-Hellman
  • RSA
  • ECC (Correct)

Answer : ECC

A security analyst discovered data such as images and word documents hidden within different types of files. Which of the following cryptographic concepts describes what was discovered?


Options are :

  • Symmetric encryption
  • Hashing
  • Non-repudiation
  • Steganography (Correct)

Answer : Steganography

The concept of rendering data passing between two points over an IP based network impervious to all but the most sophisticated advanced persistent threats is BEST categorized as which of the following?


Options are :

  • Block ciphers
  • Transport encryption (Correct)
  • Stream ciphers
  • Key escrow

Answer : Transport encryption

Which of the following types of cryptography should be used when minimal overhead is necessary for a mobile device?


Options are :

  • Block cipher
  • Elliptical curve cryptography (Correct)
  • Stream cipher
  • Diffie-Hellman algorithm

Answer : Elliptical curve cryptography

Which of the following concepts is enforced by certifying that email communications have been sent by who the message says it has been sent by?


Options are :

  • Hashing
  • Key escrow
  • Non-repudiation (Correct)
  • Multifactor authentication

Answer : Non-repudiation

Digital Signatures provide which of the following?


Options are :

  • Integrity (Correct)
  • Availability
  • Authentication
  • Confidentiality
  • Authorization

Answer : Integrity

Encryption used by RADIUS is BEST described as:


Options are :

  • Symmetric (Correct)
  • Elliptical curve
  • Asymmetric
  • Quantum

Answer : Symmetric

Users need to exchange a shared secret to begin communicating securely. Which of the following is another name for this symmetric key?


Options are :

  • Digital Signature
  • Private Key (Correct)
  • Session Key
  • Public Key

Answer : Private Key

Which of the following can hide confidential or malicious data in the whitespace of other files (e.g. JPEGs)?


Options are :

  • Steganography (Correct)
  • Transport encryption
  • Digital signatures
  • Hashing

Answer : Steganography

The concept of rendering data passing between two points over an IP based network impervious to all but the most sophisticated advanced persistent threats is BEST categorized as which of the following?


Options are :

  • Key escrow
  • Block ciphers
  • Transport encryption (Correct)
  • Stream ciphers

Answer : Transport encryption

Users need to exchange a shared secret to begin communicating securely. Which of the following is another name for this symmetric key?


Options are :

  • Session Key
  • Public Key
  • Private Key (Correct)
  • Digital Signature

Answer : Private Key

Which of the following can hide confidential or malicious data in the whitespace of other files (e.g. JPEGs)?


Options are :

  • Hashing
  • Digital signatures
  • Transport encryption
  • Steganography (Correct)

Answer : Steganography

All of the following are valid cryptographic hash functions EXCEPT:


Options are :

  • MD4.
  • RC4. (Correct)
  • SHA-512.
  • RIPEMD.

Answer : RC4.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions