CompTIA Security+ Cryptography Quiz!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 624,404
| Attempts: 699 | Questions: 24
Please wait...
Question 1 / 24
0 %
0/100
Score 0/100
1. Which of the following can be termed as �brute force attack�?

Explanation

When a particular message has been encrypted using random combinations, a person who is capturing this message will have to try all combinations of deciphering possible to expose the original message. This is known as brute force attack.

Submit
Please wait...
About This Quiz
CompTIA Security+ Cryptography Quiz! - Quiz

Test your knowledge of cryptography principles and practices, including SHA, encryption systems, and key management as per CompTIA Security+ standards.

2. When employing Caesar's Cipher key value of 3, which of the following will be the decrypted equivalent of JGOOQ?

Explanation

According to Caesars Cipher key value of 3, you would be sliding up the alphabetical value by 3. Hence H would be represented as J, E as G, L as O and O as Q.

Submit
3. Cryptography without keys is more secure than cryptography with keys. T/F?

Explanation

Cryptography without keys is not at all secure as the deciphering program will reside on the same media where the data or message is being received. In case of thest, the data can be stolen along with the deciphering program.

Submit
4. Which of the following are encryption systems? 

Explanation

RC5 and Blowfish are encryption systems. MAC is a type of hardware address. ARP is a protocol that resolves MAC address to IP address.

Submit
5. When employing message digest, if data does get modified, which of the following will be the result of that modification?

Explanation

When cryptography uses hash function on a plain text, a fixed length of data called the message digest is generated. This message digest helps to preserve the data integrity by generating a a digest value when the data was originally transmitted. If during transmission the data gests modified, the message digest value that will be resulting will be a totally different value from the original one. This is usually verified at the receiving end before accepting and confirming the receipt of data.

Submit
6. Which of the following is true about Public/Private key pairs? 

Explanation

They forma an essential part of Web site security system, as it is the most convenient security system for Web sites considering that clients would be accessing the Web site over the public network. The Certificate security system uses the basic logic of Public/Private key pairs.

Submit
7. RSA is the encryption system used in cellular devices. 

Explanation

ECC is the encryption system used in cellular devices.

Submit
8. The concept of public-key cryptography was introduced by Diffie-Hellman. 

Explanation

The issues with key distribution faced by conventional encryption was overcome by the Public-key cryptography concepts introduced by Diffie-Hellman.

Submit
9. A digital signature is synonymous to which of the following?

Explanation

A digital signature is synonymous with the handwritten signature. A signature though unique to that person varies with the person's age. Similarly, although a digital signature is unique and is used to establish the origin of that signature, it can vary from situation to situation.

Submit
10. Differential cryptanalysis is nothing but pattern studying.

Explanation

Differential Cryptanalysis is nothing but pattern studying. It chooses a pair of plain text with specific differences.

Submit
11. What is the requirement for cryptography?

Explanation

Network resource access will have to be controlled through access permissions. Server access will have to be controlled through physical security to the server. Unauthorized access prevention of stored information or information being transmitted is the role of cryptography.

Submit
12. Which of the following is the most common attack faced by the DES algorithm?

Explanation

Brute force attack is the most common attack faced by the DES algorithm

Submit
13. The keys are measured by bytes. 

Explanation

Keys are measured by bits.

Submit
14. Which of the following is an advantage of using conventional encryption?

Explanation

When conventional encryption is used for stored data rather than the data being transmitted, encryption and decryption process can be very fast.

Submit
15. Which of the following are the two key-based algorithms?

Explanation

There are two types of key-based algorithms. Depending on the key pair types they use, they can be categorized as symmetric or asymmetric algorithms.

Submit
16. Which of the following types of cryptography is possible? 

Explanation

Cryptography without encryption and before encryption is not cryptography at all. Cryptography is possible with keys and without keys. When used without keys, it will be using simple or complex substitution.

Submit
17. The block size in RC5 can range from 0 to 255. Y/N?

Explanation

The block size in RC5 can be 32-bit, 64-bit or 128-bit.

Submit
18. Which of the following statements about the SHA (Security Hash Algorithm) are true? 

Explanation

SHA is a security hash algorithm that is used with encryption protocols. Its latest version is SHA-1.

Submit
19. Which of the following is provided by IDEA? 

Explanation

IDEA provides high level of security along with ease of implementation.

Submit
20. Which of the following is responsible for key issues relating to the security of inter-bank communications?

Explanation

ABA concerns itself with key issues in providing security to financial transaction/communication between banks.

Submit
21. Which of the following is required by the cipher when it is important to maintain a message as a secret?

Explanation

To keep a message a secret it is required that the cipher must be able to generate several cipher text.

Submit
22. Which of the following best describes Rons Code 2?

Explanation

RC2 or Rons code 2 is a 64-bit block cipher. It was devised by Ron Rivest.

Submit
23. Which of the following will be required to perform Cryptanalysis?

Explanation

Cryptanalysis is a process of studying the pattern of secure communication and breaking it. It involves complex combinations such as patience and determination combined with skills of pattern finding, mathematical tools and analytical reasoning.

Submit
24. Which of the following statements about Public Key Cryptography are true? 

Explanation

The implementation of Public-key cryptography does not need any existing security measures to be implemented. The public key can only encrypt and the Private key can only decrypt.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 05, 2006
    Quiz Created by
    Vaibhav Agarwal
Cancel
  • All
    All (24)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following can be termed as �brute force attack�?
When employing Caesar's Cipher key value of 3, which of the...
Cryptography without keys is more secure than cryptography with keys....
Which of the following are encryption systems? 
When employing message digest, if data does get modified, which of the...
Which of the following is true about Public/Private key pairs? 
RSA is the encryption system used in cellular devices. 
The concept of public-key cryptography was introduced by...
A digital signature is synonymous to which of the following?
Differential cryptanalysis is nothing but pattern studying.
What is the requirement for cryptography?
Which of the following is the most common attack faced by the DES...
The keys are measured by bytes. 
Which of the following is an advantage of using conventional...
Which of the following are the two key-based algorithms?
Which of the following types of cryptography is possible? 
The block size in RC5 can range from 0 to 255. Y/N?
Which of the following statements about the SHA (Security Hash...
Which of the following is provided by IDEA? 
Which of the following is responsible for key issues relating to the...
Which of the following is required by the cipher when it is important...
Which of the following best describes Rons Code 2?
Which of the following will be required to perform Cryptanalysis?
Which of the following statements about Public Key Cryptography are...
Alert!

Advertisement