CompTIA Security+ SY0-701 Practice Test 4+5 By Mr.B

CompTIA Security+ SY0-701 Practice Test 4+5 By Mr.B

12th Grade

41 Qs

quiz-placeholder

Similar activities

Introduction to Media and Information Literacy Prt. 2

Introduction to Media and Information Literacy Prt. 2

11th - 12th Grade

40 Qs

DIAGNOSTIC TEST IN CSS

DIAGNOSTIC TEST IN CSS

11th - 12th Grade

45 Qs

C Programming Midterm Review

C Programming Midterm Review

11th - 12th Grade

40 Qs

TryOut Ujian Sekolah Pengetahuan - TIK SMP N 1 JEPARA

TryOut Ujian Sekolah Pengetahuan - TIK SMP N 1 JEPARA

12th Grade

45 Qs

Computer Apps Final Exam Review

Computer Apps Final Exam Review

9th - 12th Grade

40 Qs

Movies

Movies

2nd Grade - Professional Development

44 Qs

Digital Devices 1

Digital Devices 1

12th Grade

37 Qs

Emptech Summative Exam L-3-4-5

Emptech Summative Exam L-3-4-5

12th Grade

40 Qs

CompTIA Security+ SY0-701 Practice Test 4+5 By Mr.B

CompTIA Security+ SY0-701 Practice Test 4+5 By Mr.B

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Cyber Professor - Mr. B

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

41 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which of the following answers refers to a legacy symmetric-key block cipher encryption algorithm?

RC4

DES

RSA

DSA

Answer explanation

DES (Data Encryption Standard) is a legacy symmetric-key block cipher, widely used in the past for encrypting data. RC4 is a stream cipher, while RSA and DSA are asymmetric encryption algorithms.

2.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which of the answers listed below refers to a deprecated stream cipher used in some legacy applications, such as WEP?

RSA

DES

SSL

RC4

Answer explanation

RC4 is a deprecated stream cipher that was widely used in legacy applications, including WEP (Wired Equivalent Privacy). Its vulnerabilities have led to its decline in favor of more secure algorithms.

3.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What is the recommended replacement for DES?

DSA

RSA

RC4

AES

Answer explanation

AES (Advanced Encryption Standard) is the recommended replacement for DES (Data Encryption Standard) due to its stronger security and efficiency. DES is now considered insecure, while AES is widely adopted for secure data encryption.

4.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

An IV is a random or pseudorandom value used in cryptography to ensure that the same plaintext input does not produce the same ciphertext output, even when the same encryption key is used. The IV is typically used with encryption algorithms in block cipher modes to enhance security by introducing randomness to the encryption process.

True

False

Answer explanation

The statement is true. An IV (Initialization Vector) is essential in cryptography to ensure that identical plaintexts encrypt to different ciphertexts, enhancing security by adding randomness to the encryption process.

5.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which of the following answers refers to a block cipher mode that works by chaining the ciphertext blocks together, such that each ciphertext block depends on the previous block?

CBC

GCM

ECB

CFB

Answer explanation

CBC (Cipher Block Chaining) mode links ciphertext blocks, meaning each block's encryption depends on the previous one. This chaining enhances security compared to modes like ECB, where blocks are independent.

6.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which of the block cipher modes listed below is the simplest/weakest and therefore not recommended for use?

CBC

GCM

ECB

CTM

Answer explanation

ECB (Electronic Codebook) mode is the simplest block cipher mode but is considered weak because it encrypts identical plaintext blocks into identical ciphertext blocks, making it vulnerable to pattern analysis. Therefore, it is not recommended.

7.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which block cipher mode combines CTM for encryption with an authentication mechanism to ensure both data confidentiality and integrity?

CBC

GCM

ECB

CFB

Answer explanation

GCM (Galois/Counter Mode) combines counter mode encryption with an authentication mechanism, ensuring both confidentiality and integrity of the data. This makes it the correct choice compared to CBC, ECB, and CFB.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?