CompTIA JK0-022 Security Cryptography Certification Exam Set 9

Ann, the Chief Information Officer (CIO) of a company, sees cloud computing as a way to save money while providing valuable services. She is looking for a cost-effective solution to assist in capacity planning as well as visibility into the performance of the network. Which of the following cloud technologies should she look into?


Options are :

  • IaaS
  • MaaS (Correct)
  • SaaS
  • PaaS

Answer : MaaS

Users report that after downloading several applications, their systemsí performance has noticeably decreased. Which of the following would be used to validate programs prior to installing them?


Options are :

  • Telnet
  • MD5 (Correct)
  • SSH
  • Whole disk encryption

Answer : MD5

CompTIA Network+ N10 006 Set 6

Which of the following can be implemented with multiple bit strength?


Options are :

  • SHA-1
  • MD4
  • DES
  • AES (Correct)
  • MD5

Answer : AES

A security engineer is asked by the companyís development team to recommend the most secure method for password storage. Which of the following provide the BEST protection against brute forcing stored passwords? (Select TWO).


Options are :

  • CHAP
  • Bcrypt (Correct)
  • AES
  • PBKDF2 (Correct)
  • MD5
  • SHA2

Answer : Bcrypt PBKDF2

Which of the following would Matt, a security administrator, use to encrypt transmissions from an internal database to an internal server, keeping in mind that the encryption process must add as little latency to the process as possible?


Options are :

  • 3DES (Correct)
  • SHA
  • RSA
  • ECC

Answer : 3DES

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 11

Pete, an employee, needs a certificate to encrypt data. Which of the following would issue Pete a certificate?


Options are :

  • Certification authority (Correct)
  • Certificate revocation list
  • Key escrow
  • Registration authority

Answer : Certification authority

Recent data loss on financial servers due to security breaches forced the system administrator to harden their systems. Which of the following algorithms with transport encryption would be implemented to provide the MOST secure web connections to manage and access these servers?


Options are :

  • SSL
  • TLS (Correct)
  • HTTP
  • FTP

Answer : TLS

Sara, a security engineer, is testing encryption ciphers for performance. Which of the following ciphers offers strong encryption with the FASTEST speed?


Options are :

  • Blowfish (Correct)
  • 3DES
  • Serpent
  • AES256

Answer : Blowfish

220-702 CompTIA A+ Practical Application Practice Exam Set 8

Which of the following cryptographic algorithms is MOST often used with IPSec?


Options are :

  • RC4
  • Blowfish
  • Twofish
  • HMAC (Correct)

Answer : HMAC

Which of the following components MUST be trusted by all parties in PKI?


Options are :

  • Key escrow
  • Private key
  • Recovery key
  • CA (Correct)

Answer : CA

Which of the following MUST Matt, a security administrator, implement to verify both the integrity and authenticity of a message while requiring a shared secret?


Options are :

  • SHA
  • HMAC (Correct)
  • RIPEMD
  • MD5

Answer : HMAC

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 4

Connections using point-to-point protocol authenticate using which of the following? (Select TWO).


Options are :

  • Kerberos
  • RC4
  • RIPEMD
  • PAP (Correct)
  • CHAP (Correct)

Answer : PAP CHAP

Which of the following protocols encapsulates an IP packet with an additional IP header?


Options are :

  • HTTPS
  • IPSec (Correct)
  • SFTP
  • SSL

Answer : IPSec

Which of the following is a concern when encrypting wireless data with WEP?


Options are :

  • WEP implements weak initialization vectors for key transmission (Correct)
  • WEP displays the plain text entire key when wireless packet captures are reassembled
  • WEP uses a very weak encryption algorithm
  • WEP allows for only four pre-shared keys to be configured

Answer : WEP implements weak initialization vectors for key transmission

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 10

Which of the following is used to verify data integrity?


Options are :

  • 3DES
  • AES
  • RSA
  • SHA (Correct)

Answer : SHA

Jane, a VPN administrator, was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Jane select for the tunnel encryption?


Options are :

  • DES
  • HMAC
  • SHA256
  • Blowfish (Correct)

Answer : Blowfish

To ensure compatibility with their flagship product, the security engineer is tasked to recommend an encryption cipher that will be compatible with the majority of third party software and hardware vendors. Which of the following should be recommended?


Options are :

  • MD5
  • SHA
  • AES (Correct)
  • Blowfish

Answer : AES

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Which of the following would provide the STRONGEST encryption?


Options are :

  • Random one-time pad (Correct)
  • DES with a 56-bit key
  • AES with a 256-bit key
  • RSA with a 1024-bit key

Answer : Random one-time pad

A systems administrator has implemented PKI on a classified government network. In the event that a disconnect occurs from the primary CA, which of the following should be accessible locally from every site to ensure users with bad certificates cannot gain access to the network?


Options are :

  • A CRL (Correct)
  • A verification authority
  • A redundant CA
  • Make the RA available

Answer : A CRL

While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing?


Options are :

  • WEP (Correct)
  • WPA
  • PEAP
  • EAP-TLS

Answer : WEP

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 3

A security administrator has been tasked with setting up a new internal wireless network that must use end to end TLS. Which of the following may be used to meet this objective?


Options are :

  • WEP
  • WPA
  • HTTPS
  • WPA 2 (Correct)

Answer : WPA 2

Joe, the systems administrator, is setting up a wireless network for his teamís laptops only and needs to prevent other employees from accessing it. Which of the following would BEST address this?


Options are :

  • Lower the access pointís power settings.
  • Use WPA instead of WEP encryption.
  • Implement MAC filtering on the access point. (Correct)
  • Disable default SSID broadcasting.

Answer : Implement MAC filtering on the access point.

Which of the following can use RC4 for encryption? (Select TWO).


Options are :

  • WEP (Correct)
  • SSL (Correct)
  • CHAP
  • AES
  • 3DES

Answer : WEP SSL

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 7

Which of the following ciphers would be BEST used to encrypt streaming video?


Options are :

  • SHA1
  • RC4 (Correct)
  • 3DES
  • RSA

Answer : RC4

Which of the following symmetric key algorithms are examples of block ciphers? (Select THREE)


Options are :

  • 3DES (Correct)
  • MD5
  • PGP
  • AES (Correct)
  • Blowfish (Correct)
  • RC4

Answer : 3DES AES Blowfish

A new MPLS network link has been established between a company and its business partner. The link provides logical isolation in order to prevent access from other business partners. Which of the following should be applied in order to achieve confidentiality and integrity of all data across the link?


Options are :

  • SSL/TLS for all application flows.
  • HTTPS and SSH for all application flows.
  • IPSec VPN tunnels on top of the MPLS link. (Correct)
  • MPLS should be run in IPVPN mode.

Answer : IPSec VPN tunnels on top of the MPLS link.

CompTIA Security+ SY0-501 Questions & Answers Set 1

When using PGP, which of the following should the end user protect from compromise? (Select TWO).


Options are :

  • Private key (Correct)
  • Key password (Correct)
  • Recovery agent
  • Key escrow
  • CRL details
  • Public key

Answer : Private key Key password

A security administrator must implement a wireless encryption system to secure mobile devicesí communication. Some users have mobile devices which only support 56-bit encryption. Which of the following wireless encryption methods should be implemented?


Options are :

  • MD5
  • RC4 (Correct)
  • AES
  • TKIP

Answer : RC4

Which of the following protocols is the security administrator observing in this packet capture? 12:33:43, SRC 192.168.4.3:3389, DST 10.67.33.20:8080, SYN/ACK


Options are :

  • HTTPS
  • RDP (Correct)
  • SFTP
  • HTTP

Answer : RDP

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Joe, a user, reports to the system administrator that he is receiving an error stating his certificate has been revoked. Which of the following is the name of the database repository for these certificates?


Options are :

  • OCSP
  • CRL (Correct)
  • CA
  • CSR

Answer : CRL

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions