Set3 CompTIA Security+ Sample Questions: Cryptography

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 624,400
| Attempts: 7,267 | Questions: 23
Please wait...
Question 1 / 23
0 %
0/100
Score 0/100
1. The higher the number of bits, more secure is the key. T/F?

Explanation

Keys are measured by bits. Higher the value of keys used, more reliable will be the encryption system.

Submit
Please wait...
About This Quiz
Set3 CompTIA Security+ Sample Questions: Cryptography - Quiz

This is Set 3 of 4 of practice questions for CompTIA Security+ exam. This set covers the exam objective Cryptography. You can take these Security+ sample questions for... see morepractice or take it as a topic wise practice exam. Read the questions carefully and answer. So, let's try out the quiz. All the best!
Feedback and comments are welcome.
see less

2. In asymmetric-key encryption, one key will be used for encryption and another will be used for decryption to provide maximum security. T/F?

Explanation

In asymmetric-key encryption, one key will be used for encryption as well as decryption.

Submit
3. Which of the following components decides how secure an encryption protocol is?

Explanation

The number of bits used for encryption by the algorithm decides how secure that encryption type will be.

Submit
4. Even today only upto 20% of critical information being transmitted is really secure. T/F?

Explanation

A lot of information being transmitted through the Internet is still not entirely secure. Only 15-20% of data transmission is completely secure.

Submit
5. The concept of public key cryptography was introduced by Julius Caesar. T/F?

Explanation

The issues with key distribution faced by conventional encryption, was overcome by the Public-key cryptography concepts introduced by Diffie-Hellman.

Submit
6. Choose the odd one out.

Explanation

RC5, ECC and Blowfish are encryption systems. MAC is a type of hardware address.

Submit
7. ECC is the encryption system used in cellular devices. T/F?

Explanation

ECC is the encryption system used in cellular devices.

Submit
8. Which of the following is true?

Explanation



PK cryptography, or public-key cryptography, is not necessarily very complex and nearly impossible to set up. Additionally, in public-key cryptography, you use one key for encryption (the public key) and a different key for decryption (the private key). Therefore, the statement "You need just one single key for encrypting as well as decrypting in PK cryptography" is incorrect. Finally, both the public key and private key have specific functions: the public key is used for encryption, and the private key is used for decryption. Therefore, the statement "Public key can only encrypt and private key can only decrypt" is also incorrect.
Submit
9. PKI requires skilled and continuous maintenance on the network. T/F?

Explanation

PKI when implemented on a network will require a skilled person to oversee its maintenance in the long run.

Submit
10. Which of the following is an advantage of using conventional encryption?

Explanation

When conventional encryption is used for stored data rather than the data being transmitted, encryption and decryption process can be very fast.

Submit
11. Which of the following does cryptography use to encrypt?

Explanation

When cryptography uses hash function on a plain text, a fixed length of data called the message digest is generated. This message digest helps to preserve the data integrity by generating a digest value when the data is transmitted.

Submit
12. Which of the following is not used by certificate system?

Explanation

The Certificate security system uses the basic logic of Public/Private key pairs in combination of session ID. There is no key such as session key.

Submit
13. Which of the following statements is true?

Explanation

Given a public key it is extremely difficult to derive a private key from it. A session ID is used to provide security to a key being transmitted and is not used to generate any key.

Submit
14. Which of the following is true regarding Caesar�s key value 3?

Explanation

According to Caesars Cipher key value of 3, you would be sliding up the alphabetical value by 3. The difference would be 2 and not 3. If A has to be represented by Caesars key value 3 system, it would be represented as C.

Submit
15. Traditional PKI uses self assembly process to maintain security. T/F?

Explanation

Traditional PKI us incapable of self assembly, which is a draw back with PKI.

Submit
16. Which of the following is an improvement over the scheme used in digital signatures?

Explanation

One-way hash functions generate significantly less data and are much more.

Submit
17. PKI uses which of the following to ascertain identity?

Explanation

Digital signature is ideal for an Intranet or LAN scenario. Handprint is used in Biometrics. PKI uses certificates for establishing Identity.

Submit
18. Which of the following is the latest version of SHA?

Explanation

The correct answer is None of the above. The latest version of the Secure Hash Algorithm (SHA) is SHA-3, which was chosen in 2012 after a public competition among non-NSA designers. It supports the same hash lengths as SHA-2, and its internal structure differs significantly from the rest of the SHA family. As of now, there is no SHA-4 or SHA-4.1.

Submit
19. Cryptanalysis is nothing but pattern finding T/F?

Explanation

Pattern finding is a part of cryptanalysis it does not form the entire process of cryptanalysis.

Submit
20. Cryptography is an essential in encapsulation protocols. T/F?

Explanation

Cryptography is essential in encryption protocols.

Submit
21. Which of the following is an improvement over PKI?

Explanation

SMSA is an improvement over PKI where implementation maintenance and administration is concerned. This is because SMSA is capable of self assembly.

Submit
22. Which of the following is used to sign the certificate created by the CA?

Explanation

The certificate generated by the CA is signed using the CAs private key.

Submit
23. A digital signature is used for which of the following?

Explanation

A digital signature is used to establish Identity of the communicating user as well as encrypting in specific cases.

Submit
View My Results

Quiz Review Timeline (Updated): Feb 7, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 07, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 18, 2006
    Quiz Created by
    Vaibhav Agarwal
Cancel
  • All
    All (23)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The higher the number of bits, more secure is the key. T/F?
In asymmetric-key encryption, one key will be used for encryption and...
Which of the following components decides how secure an encryption...
Even today only upto 20% of critical information being transmitted is...
The concept of public key cryptography was introduced by Julius...
Choose the odd one out.
ECC is the encryption system used in cellular devices. T/F?
Which of the following is true?
PKI requires skilled and continuous maintenance on the network. T/F?
Which of the following is an advantage of using conventional...
Which of the following does cryptography use to encrypt?
Which of the following is not used by certificate system?
Which of the following statements is true?
Which of the following is true regarding Caesar�s key value 3?
Traditional PKI uses self assembly process to maintain security. T/F?
Which of the following is an improvement over the scheme used in...
PKI uses which of the following to ascertain identity?
Which of the following is the latest version of SHA?
Cryptanalysis is nothing but pattern finding T/F?
Cryptography is an essential in encapsulation protocols. T/F?
Which of the following is an improvement over PKI?
Which of the following is used to sign the certificate created by the...
A digital signature is used for which of the following?
Alert!

Advertisement