Search Header Logo

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

Authored by Wayground Content

Computers

9th Grade

Used 3+ times

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A portable laptop is running Windows 10 Pro. A user enables BitLocker on Drive D. Which of the following statements is true? If the user copies of filed to a network share, it remains encrypted. If the user copies a file to an unencrypted USB drive, the file remains encrypted. The files will be automatically decrypted when the drive is installed in another computer. All of these statements are true. None of these statements are true.

If the user copies of filed to a network share, it remains encrypted.

If the user copies a file to an unencrypted USB drive, the file remains encrypted.

The files will be automatically decrypted when the drive is installed in another computer.

None of these statements are true.

Answer explanation

BitLocker is a full disc encryption solution. BitLocker protects a drive, and the file starts on the drive against Data Theft if the device is lost or stolen.

However, the files are only protected while they reside on the drive.

These files lose their encryption when they are copied to a network share or an unencrypted Drive.

As a result, your files will not stay encrypted if you copy them to a network share or a USB disk.

You would have to use another encryption method for a network share or USB storage.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key management practice?

Using the same key for all users

Regularly rotating encryption keys

Storing keys in plain text

Sharing keys over unsecured channels

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The human resources organization want to ensure that stored employee data is encrypted. Which security mechanism would they use?

Encryption at rest

Data masking

Access control

Network segmentation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main advantage of using public key infrastructure (PKI)?

It provides a framework for managing digital certificates and keys.

It eliminates the need for encryption altogether.

It allows for unlimited data storage without security risks.

It simplifies the process of password recovery.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hardware component is designed for cryptographic functions on modern motherboards?

Secure Enclave

Key Management Systems (KMS)

Hardware Security Module (HSM)

Trusted Platform Module (TPM)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to locate hardware in secure locations?

To enhance network performance

To protect against physical theft and tampering

To reduce energy consumption

To improve software compatibility

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of symmetric encryption?

It uses a pair of keys: one public and one private.

It uses the same key for both encryption and decryption.

It is slower than asymmetric encryption.

It is primarily used for digital signatures.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?