015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

9th Grade

18 Qs

quiz-placeholder

Similar activities

Cryptography

Cryptography

9th - 10th Grade

20 Qs

CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

8th Grade - Professional Development

21 Qs

Database Security Quiz

Database Security Quiz

11th Grade

15 Qs

Key Exchange - CompTIA Security+ SY0-701 - 1.4

Key Exchange - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

Data Transmission Quiz

Data Transmission Quiz

9th Grade

20 Qs

Cybersecurity Awareness

Cybersecurity Awareness

12th Grade

20 Qs

AP CSP Unit 4 Ch 1 Vocab

AP CSP Unit 4 Ch 1 Vocab

9th - 12th Grade

19 Qs

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

Assessment

Quiz

Computers

9th Grade

Easy

Created by

Quizizz Content

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A portable laptop is running Windows 10 Pro. A user enables BitLocker on Drive D. Which of the following statements is true? If the user copies of filed to a network share, it remains encrypted. If the user copies a file to an unencrypted USB drive, the file remains encrypted. The files will be automatically decrypted when the drive is installed in another computer. All of these statements are true. None of these statements are true.

If the user copies of filed to a network share, it remains encrypted.

If the user copies a file to an unencrypted USB drive, the file remains encrypted.

The files will be automatically decrypted when the drive is installed in another computer.

None of these statements are true.

Answer explanation

BitLocker is a full disc encryption solution. BitLocker protects a drive, and the file starts on the drive against Data Theft if the device is lost or stolen.

However, the files are only protected while they reside on the drive.

These files lose their encryption when they are copied to a network share or an unencrypted Drive.

As a result, your files will not stay encrypted if you copy them to a network share or a USB disk.

You would have to use another encryption method for a network share or USB storage.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key management practice?

Using the same key for all users

Regularly rotating encryption keys

Storing keys in plain text

Sharing keys over unsecured channels

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The human resources organization want to ensure that stored employee data is encrypted. Which security mechanism would they use?

Encryption at rest

Data masking

Access control

Network segmentation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main advantage of using public key infrastructure (PKI)?

It provides a framework for managing digital certificates and keys.

It eliminates the need for encryption altogether.

It allows for unlimited data storage without security risks.

It simplifies the process of password recovery.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hardware component is designed for cryptographic functions on modern motherboards?

Secure Enclave

Key Management Systems (KMS)

Hardware Security Module (HSM)

Trusted Platform Module (TPM)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to locate hardware in secure locations?

To enhance network performance

To protect against physical theft and tampering

To reduce energy consumption

To improve software compatibility

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of symmetric encryption?

It uses a pair of keys: one public and one private.

It uses the same key for both encryption and decryption.

It is slower than asymmetric encryption.

It is primarily used for digital signatures.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?