015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

Quiz
•
Computers
•
9th Grade
•
Easy
Quizizz Content
Used 1+ times
FREE Resource
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A portable laptop is running Windows 10 Pro. A user enables BitLocker on Drive D. Which of the following statements is true? If the user copies of filed to a network share, it remains encrypted. If the user copies a file to an unencrypted USB drive, the file remains encrypted. The files will be automatically decrypted when the drive is installed in another computer. All of these statements are true. None of these statements are true.
If the user copies of filed to a network share, it remains encrypted.
If the user copies a file to an unencrypted USB drive, the file remains encrypted.
The files will be automatically decrypted when the drive is installed in another computer.
None of these statements are true.
Answer explanation
BitLocker is a full disc encryption solution. BitLocker protects a drive, and the file starts on the drive against Data Theft if the device is lost or stolen.
However, the files are only protected while they reside on the drive.
These files lose their encryption when they are copied to a network share or an unencrypted Drive.
As a result, your files will not stay encrypted if you copy them to a network share or a USB disk.
You would have to use another encryption method for a network share or USB storage.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a key management practice?
Using the same key for all users
Regularly rotating encryption keys
Storing keys in plain text
Sharing keys over unsecured channels
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The human resources organization want to ensure that stored employee data is encrypted. Which security mechanism would they use?
Encryption at rest
Data masking
Access control
Network segmentation
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main advantage of using public key infrastructure (PKI)?
It provides a framework for managing digital certificates and keys.
It eliminates the need for encryption altogether.
It allows for unlimited data storage without security risks.
It simplifies the process of password recovery.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which hardware component is designed for cryptographic functions on modern motherboards?
Secure Enclave
Key Management Systems (KMS)
Hardware Security Module (HSM)
Trusted Platform Module (TPM)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to locate hardware in secure locations?
To enhance network performance
To protect against physical theft and tampering
To reduce energy consumption
To improve software compatibility
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a characteristic of symmetric encryption?
It uses a pair of keys: one public and one private.
It uses the same key for both encryption and decryption.
It is slower than asymmetric encryption.
It is primarily used for digital signatures.
Create a free account and access millions of resources
Similar Resources on Wayground
22 questions
Utility Software

Quiz
•
KG - University
18 questions
BTEC DIT Device Hardening and Encryption

Quiz
•
10th Grade
15 questions
Encryption Quiz

Quiz
•
10th Grade
18 questions
iGCSE Computer Science: Data Compression and Encryption

Quiz
•
9th - 12th Grade
20 questions
A level CS Unit 17 Security

Quiz
•
12th Grade
19 questions
Encryption

Quiz
•
12th Grade
16 questions
IBA Chapter 8B

Quiz
•
8th - 12th Grade
15 questions
Cryptography

Quiz
•
10th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade