Domain 1 - Cryptography (Test)

Card Set Information

Author:
mpskeeter
ID:
310937
Filename:
Domain 1 - Cryptography (Test)
Updated:
2015-11-04 22:35:48
Tags:
Security Cryptography Test
Folders:
Security+
Description:
Security+ Domain 1 - Cryptography (Test)
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user mpskeeter on FreezingBlue Flashcards. What would you like to do?


  1. All of the following are valid cryptographic hash functions EXCEPT?

    A) RIPEMD.
    B) SHA-512.
    C) MD4.
    D) RC4.
    D) RC4.
    (this multiple choice question has been scrambled)
  2. An achievement in providing worldwide internet security was the signing of certificates with which of the following protocols?

    A) SCP
    B) SSH
    C) TCP/IP
    D) SSL
    D) SSL
    (this multiple choice question has been scrambled)
  3. A certificate authority takes which of the following actions in PKI?

    A) Use of public keys only
    B) Publishes key escrow lists to CRLs
    C) Issues and signs all root certificates
    D) Use of public and private keys
    C) Issues and signs all root certificates
    (this multiple choice question has been scrambled)
  4. The security administrators wants each user to individually decrypt a message but allow anybody to encrypt it. Which of the following MUST be implemented to allow this type of authorization?
    A) Use of private keys only
    B) Use of CA certificate
    C) Use of public keys only
    D) Use of public and private keys
    D) Use of public and private keys
    (this multiple choice question has been scrambled)
  5. A security administrator must implement a system to allow clients to securely negotiate encryption keys with the company's server over a public unencrypted communication channel (Select TWO).
    A) PBKDF2
    B) Symmetric encryption
    C) Stenography
    D) ECDHE
    E) Diffie-Hellman
    • D) ECDHE
    • E) Diffie-Hellman
  6. Which of the following algorithms has well documented collisions? (Select TWO)
    A) AES
    B) MD5
    C) SHA-256
    D) RSA
    E) SHA
    • B) MD5
    • E) SHA

What would you like to do?

Home > Flashcards > Print Preview