CompTIA JK0-022 Security Cryptography Certification Exam Set 6

Company A sends a PGP encrypted file to company B. If company A used company Bís public key to encrypt the file, which of the following should be used to decrypt data at company B?


Options are :

  • Registration
  • CRLs
  • Public key
  • Private key (Correct)

Answer : Private key

CompTIA JK0-801 A+ Certification Practical Exam Set 5

When employees that use certificates leave the company they should be added to which of the following?


Options are :

  • TKIP
  • PKI
  • CRL (Correct)
  • CA

Answer : CRL

The security administrator installed a newly generated SSL certificate onto the company web server. Due to a misconfiguration of the website, a downloadable file containing one of the pieces of the key was available to the public. It was verified that the disclosure did not require a reissue of the certificate. Which of the following was MOST likely compromised?


Options are :

  • The file containing the public key (Correct)
  • The file containing the private key.
  • The file containing the serverís encrypted passwords.
  • The file containing the recovery agentís keys.

Answer : The file containing the public key

The public key is used to perform which of the following? (Select THREE).


Options are :

  • Validate the CRL
  • Encrypt messages (Correct)
  • Perform key recovery
  • Decrypt messages (Correct)
  • Validate the identity of an email sender (Correct)
  • Perform key escrow

Answer : Encrypt messages Decrypt messages Validate the identity of an email sender

SY0-401 CompTIA Security+ Certification Practice Exam Set 8

Which of the following devices is MOST likely being used when processing the following?


Options are :

  • Load balancer
  • NIPS
  • Firewall (Correct)
  • URL filter

Answer : Firewall

A security analyst performs the following activities: monitors security logs, installs surveillance cameras and analyzes trend reports. Which of the following job responsibilities is the analyst performing? (Select TWO).


Options are :

  • Detect security incidents (Correct)
  • Prevent unauthorized access
  • Reduce attack surface of systems
  • Hardening network devices
  • Implement monitoring controls (Correct)

Answer : Detect security incidents Implement monitoring controls

A network administrator is looking for a way to automatically update company browsers so they import a list of root certificates from an online source. This online source will then be responsible for tracking which certificates are to be trusted or not trusted. Which of the following BEST describes the service that should be implemented to meet these requirements?


Options are :

  • PKI
  • nOCSP
  • Trust model (Correct)
  • Key escrow

Answer : Trust model

Test : CompTIA Cloud+ Certification

Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?


Options are :

  • Recovery agent (Correct)
  • Certificate authority
  • Key escrow
  • nTrust model

Answer : Recovery agent

Which of the following allows an organization to store a sensitive PKI component with a trusted third party?


Options are :

  • Trust model
  • Private key
  • Key escrow (Correct)
  • Public Key Infrastructure

Answer : Key escrow

Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?


Options are :

  • CA
  • Registration
  • CRL (Correct)
  • Recovery agent

Answer : CRL

SY0-401 CompTIA Security+ Certification Practice Exam Set 2

Which of the following provides a static record of all certificates that are no longer valid?


Options are :

  • CRLs (Correct)
  • CA
  • Recovery agent
  • Private key

Answer : CRLs

Key cards at a bank are not tied to individuals, but rather to organizational roles. After a break in, it becomes apparent that extra efforts must be taken to successfully pinpoint who exactly enters secure areas. Which of the following security measures can be put in place to mitigate the issue until a new key card system can be installed?


Options are :

  • Video surveillance (Correct)
  • Bollards
  • Proximity readers
  • Fencing

Answer : Video surveillance

Public key certificates and keys that are compromised or were issued fraudulently are listed on which of the following?


Options are :

  • ACL
  • PKI
  • CA
  • CRL (Correct)

Answer : CRL

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 10

An administrator needs to renew a certificate for a web server. Which of the following should be submitted to a CA?


Options are :

  • CRL
  • Private key
  • Recovery agent
  • CSR (Correct)

Answer : CSR

The server administrator has noticed that most servers have a lot of free disk space and low memory utilization. Which of the following statements will be correct if the server administrator migrates to a virtual server environment?


Options are :

  • The administrator will not be able to add a test virtual environment in the data center.
  • The administrator will need to deploy load balancing and clustering.
  • The administrator may spend more on licensing but less on hardware and equipment. (Correct)
  • Servers will encounter latency and lowered throughput issues.

Answer : The administrator may spend more on licensing but less on hardware and equipment.

Which of the following is a requirement when implementing PKI if data loss is unacceptable?


Options are :

  • Certificate revocation list
  • Non-repudiation
  • Web of trust
  • Key escrow (Correct)

Answer : Key escrow

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 5

Public keys are used for which of the following?


Options are :

  • Bulk encryption of IP based email traffic
  • Decrypting the hash of an electronic signature (Correct)
  • Encrypting web browser traffic
  • Decrypting wireless messages

Answer : Decrypting the hash of an electronic signature

Which of the following BEST describes part of the PKI process?


Options are :

  • User1 decrypts data with User2ís private key
  • User1 encrypts data with User2ís public key (Correct)
  • User1 hashes data with User2ís private key
  • User1 hashes data with User2ís public key

Answer : User1 encrypts data with User2ís public key

Pete, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following should be used to accomplish this task? (Select TWO).


Options are :

  • Public key
  • Recovery agent (Correct)
  • CRL
  • Private hash
  • Key escrow (Correct)

Answer : Recovery agent Key escrow

SY0-401 CompTIA Security+ Certification Practice Exam Set 10

Which of the following is synonymous with a serverís certificate?


Options are :

  • Public key (Correct)
  • Private key
  • CRL
  • Recovery agent

Answer : Public key

In which of the following scenarios is PKI LEAST hardened?


Options are :

  • All public keys are accessed by an unauthorized user.
  • A malicious CA certificate is loaded on all the clients. (Correct)
  • The recorded time offsets are developed with symmetric keys.
  • The CRL is posted to a publicly accessible location.

Answer : A malicious CA certificate is loaded on all the clients.

A CA is compromised and attacks start distributing maliciously signed software updates. Which of the following can be used to warn users about the malicious activity?


Options are :

  • Key escrow
  • Certificate revocation list (Correct)
  • Private key verification
  • Public key verification

Answer : Certificate revocation list

SY0-401 CompTIA Security+ Certification Practice Exam Set 10

Which of the following devices is BEST suited for servers that need to store private keys?


Options are :

  • Solid state disk drive
  • Hardened network firewall
  • Hardened host firewall
  • Hardware security module (Correct)

Answer : Hardware security module

A security administrator needs a locally stored record to remove the certificates of a terminated employee. Which of the following describes a service that could meet these requirements?


Options are :

  • OCSP
  • CRL (Correct)
  • PKI
  • CA

Answer : CRL

Which of the following explains the difference between a public key and a private key?


Options are :

  • The private key only decrypts the data while the public key only encrypts the data. Both keys are mathematically related.
  • The private key is commonly used in symmetric key decryption while the public key is used in asymmetric key decryption.
  • The public key is only used by the client while the private key is available to all. Both keys are mathematically related.
  • The private key is only used by the client and kept secret while the public key is available to all. (Correct)

Answer : The private key is only used by the client and kept secret while the public key is available to all.

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 6

Which of the following will help prevent smurf attacks?


Options are :

  • Allowing necessary UDP packets in and out of the network
  • Disabling directed broadcast on border routers (Correct)
  • Disabling unused services on the gateway firewall
  • Flash the BIOS with the latest firmware

Answer : Disabling directed broadcast on border routers

Which of the following is true about an email that was signed by User A and sent to User B?


Options are :

  • User A signed with their own private key and User B verified with User Aís public key. (Correct)
  • User A signed with User Bís public key and User B verified with their own private key.
  • User A signed with User Bís private key and User B verified with their own public key.
  • User A signed with their own public key and User B verified with User Aís private key.

Answer : User A signed with their own private key and User B verified with User Aís public key.

Which of the following identifies certificates that have been compromised or suspected of being compromised?


Options are :

  • Access control list
  • Certificate authority
  • Certificate revocation list (Correct)
  • Key escrow registry

Answer : Certificate revocation list

SY0-401 CompTIA Security+ Certification Practice Exam Set 4

Which of the following is true about PKI? (Select TWO).


Options are :

  • When encrypting a message with the public key, only the CA can decrypt it.
  • When encrypting a message with the public key, only the public key can decrypt it.
  • When encrypting a message with the public key, only the private key can decrypt it. (Correct)
  • When encrypting a message with the private key, only the private key can decrypt it.
  • When encrypting a message with the private key, only the public key can decrypt it. (Correct)

Answer : When encrypting a message with the public key, only the private key can decrypt it. When encrypting a message with the private key, only the public key can decrypt it.

Ann wants to send a file to Joe using PKI. Which of the following should Ann use in order to sign the file?


Options are :

  • Joeís private key
  • Joeís public key
  • Annís public key
  • Annís private key (Correct)

Answer : Annís private key

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions