CompTIA JK0-022 Security Cryptography Certification Exam Set 3

Which of the following ports should be opened on a firewall to allow for NetBIOS communication? (Select TWO)


Options are :

  • 139
  • 143
  • 443
  • 161
  • 137
  • 110

Answer : 139 137

Which of the following concepts is used by digital signatures to ensure integrity of the data?


Options are :

  • Key escrow
  • Hashing
  • Non-repudiation
  • Transport encryption

Answer : Hashing

Which of the following concepts is enforced by certifying that email communications have been sent by who the message says it has been sent by?


Options are :

  • Multifactor authentication
  • Non-repudiation
  • Key escrow
  • Hashing

Answer : Non-repudiation

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 5

Which of the following must a user implement if they want to send a secret message to a coworker by embedding it within an image?


Options are :

  • Transport encryption
  • Hashing
  • Digital signature
  • Steganography

Answer : Steganography

Which of the following ports should be opened on a firewall to allow for NetBIOS communication? (Select TWO).


Options are :

  • 161
  • 443
  • 143
  • 137
  • 139
  • 110

Answer : 137 139

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 6

A company uses PGP to ensure that sensitive email is protected. Which of the following types of cryptography is being used here for the key exchange?


Options are :

  • Symmetric
  • Hashing
  • Session-based
  • Asymmetric

Answer : Symmetric

Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server?


Options are :

  • TLS
  • SSLv2
  • RSA
  • SSHv1

Answer : TLS

CompTIA SY0-401 Security Certification Practice Exam Set 8

In order to securely communicate using PGP, the sender of an email must do which of the following when sending an email to a recipient for the first time?


Options are :

  • Import the recipient's private key
  • Import the recipient's public key
  • Export the sender's private key
  • Export the sender's public key

Answer : Import the recipient's public key

Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session?


Options are :

  • SFTP
  • TLS
  • TFTP
  • HTTPS

Answer : TLS

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 3

A security administrator discovers an image file that has several plain text documents hidden in the file. Which of the following security goals is met by camouflaging data inside of other files?


Options are :

  • Confidentiality
  • Availability
  • Integrity
  • Steganography

Answer : Steganography

A security administrator discovers an image file that has several plain text documents hidden in the file. Which of the following security goals is met by camouflaging data inside of other files?


Options are :

  • Confidentiality
  • Availability
  • Steganography
  • Integrity

Answer : Steganography

Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server?


Options are :

  • SSLv2
  • RSA
  • TLS
  • SSHv1

Answer : TLS

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 1

Which of the following must a user implement if they want to send a secret message to a coworker by embedding it within an image?


Options are :

  • Steganography
  • Transport encryption
  • Digital signature
  • Hashing

Answer : Steganography

Symmetric encryption utilizes __________, while asymmetric encryption utilizes _________.


Options are :

  • Public keys, one time
  • Private keys, session keys
  • Private keys, public keys
  • Shared keys, private keys

Answer : Private keys, public keys

CompTIA Security+ SY0-501 Exam Preparation (Latest Version) Set 7

A security analyst discovered data such as images and word documents hidden within different types of files. Which of the following cryptographic concepts describes what was discovered?


Options are :

  • Symmetric encryption
  • Hashing
  • Non-repudiation
  • Steganography

Answer : Steganography

The concept of rendering data passing between two points over an IP based network impervious to all but the most sophisticated advanced persistent threats is BEST categorized as which of the following?


Options are :

  • Block ciphers
  • Transport encryption
  • Stream ciphers
  • Key escrow

Answer : Transport encryption

Which of the following types of cryptography should be used when minimal overhead is necessary for a mobile device?


Options are :

  • Block cipher
  • Elliptical curve cryptography
  • Stream cipher
  • Diffie-Hellman algorithm

Answer : Elliptical curve cryptography

JK0-802 CompTIA A+ Certification Exam Set 12

Which of the following concepts is enforced by certifying that email communications have been sent by who the message says it has been sent by?


Options are :

  • Hashing
  • Key escrow
  • Non-repudiation
  • Multifactor authentication

Answer : Non-repudiation

Digital Signatures provide which of the following?


Options are :

  • Integrity
  • Availability
  • Authentication
  • Confidentiality
  • Authorization

Answer : Integrity

Encryption used by RADIUS is BEST described as:


Options are :

  • Symmetric
  • Elliptical curve
  • Asymmetric
  • Quantum

Answer : Symmetric

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 5

Users need to exchange a shared secret to begin communicating securely. Which of the following is another name for this symmetric key?


Options are :

  • Digital Signature
  • Private Key
  • Session Key
  • Public Key

Answer : Private Key

Which of the following can hide confidential or malicious data in the whitespace of other files (e.g. JPEGs)?


Options are :

  • Steganography
  • Transport encryption
  • Digital signatures
  • Hashing

Answer : Steganography

The concept of rendering data passing between two points over an IP based network impervious to all but the most sophisticated advanced persistent threats is BEST categorized as which of the following?


Options are :

  • Key escrow
  • Block ciphers
  • Transport encryption
  • Stream ciphers

Answer : Transport encryption

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 10

Users need to exchange a shared secret to begin communicating securely. Which of the following is another name for this symmetric key?


Options are :

  • Session Key
  • Public Key
  • Private Key
  • Digital Signature

Answer : Private Key

Which of the following can hide confidential or malicious data in the whitespace of other files (e.g. JPEGs)?


Options are :

  • Hashing
  • Digital signatures
  • Transport encryption
  • Steganography

Answer : Steganography

All of the following are valid cryptographic hash functions EXCEPT:


Options are :

  • MD4.
  • RC4.
  • SHA-512.
  • RIPEMD.

Answer : RC4.

JK0-802 CompTIA A+ Certification Exam Set 11

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions