015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

9th Grade

18 Qs

quiz-placeholder

Similar activities

Administrasi Infrastruktur Jaringan 1

Administrasi Infrastruktur Jaringan 1

11th Grade

20 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Lecture Exercise Topic 1.3

Lecture Exercise Topic 1.3

12th Grade

21 Qs

Firewall and Network Security

Firewall and Network Security

University

15 Qs

UNIT 1.8 ELCE

UNIT 1.8 ELCE

10th Grade

14 Qs

แบบทดสอบบทที่ 1 เรื่อง ข้อมูลมีคุณค่า ม.5

แบบทดสอบบทที่ 1 เรื่อง ข้อมูลมีคุณค่า ม.5

10th Grade

20 Qs

Week 4

Week 4

University

15 Qs

Computer Science - X

Computer Science - X

8th - 10th Grade

20 Qs

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

Assessment

Quiz

Computers

9th Grade

Practice Problem

Easy

Created by

Wayground Content

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A portable laptop is running Windows 10 Pro. A user enables BitLocker on Drive D. Which of the following statements is true? If the user copies of filed to a network share, it remains encrypted. If the user copies a file to an unencrypted USB drive, the file remains encrypted. The files will be automatically decrypted when the drive is installed in another computer. All of these statements are true. None of these statements are true.

If the user copies of filed to a network share, it remains encrypted.

If the user copies a file to an unencrypted USB drive, the file remains encrypted.

The files will be automatically decrypted when the drive is installed in another computer.

None of these statements are true.

Answer explanation

BitLocker is a full disc encryption solution. BitLocker protects a drive, and the file starts on the drive against Data Theft if the device is lost or stolen.

However, the files are only protected while they reside on the drive.

These files lose their encryption when they are copied to a network share or an unencrypted Drive.

As a result, your files will not stay encrypted if you copy them to a network share or a USB disk.

You would have to use another encryption method for a network share or USB storage.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key management practice?

Using the same key for all users

Regularly rotating encryption keys

Storing keys in plain text

Sharing keys over unsecured channels

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The human resources organization want to ensure that stored employee data is encrypted. Which security mechanism would they use?

Encryption at rest

Data masking

Access control

Network segmentation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main advantage of using public key infrastructure (PKI)?

It provides a framework for managing digital certificates and keys.

It eliminates the need for encryption altogether.

It allows for unlimited data storage without security risks.

It simplifies the process of password recovery.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hardware component is designed for cryptographic functions on modern motherboards?

Secure Enclave

Key Management Systems (KMS)

Hardware Security Module (HSM)

Trusted Platform Module (TPM)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to locate hardware in secure locations?

To enhance network performance

To protect against physical theft and tampering

To reduce energy consumption

To improve software compatibility

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of symmetric encryption?

It uses a pair of keys: one public and one private.

It uses the same key for both encryption and decryption.

It is slower than asymmetric encryption.

It is primarily used for digital signatures.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?