CompTIA CASP+ Domain 3: Security Engineering and Cryptography Welcome to your CompTIA CASP+ Domain 3: Security Engineering and Cryptography 1. CompTIA CASP+: Security Engineering and Cryptography In the context of cryptographic algorithms, which of the following is considered a symmetric key algorithm? A. RSA B. ECC C. AES D. PGP None 2. CompTIA CASP+: Security Engineering and Cryptography Which cryptographic attack method involves decrypting a ciphertext by trying every possible key? A. Man-in-the-middle attack B. Brute force attack C. Cryptanalysis D. Side-channel attack None 3. CompTIA CASP+: Security Engineering and Cryptography What is the primary purpose of using a Public Key Infrastructure (PKI)? A. To manage network configurations B. To authenticate users on a network C. To manage the creation, distribution, and revocation of digital certificates D. To encrypt internet traffic None 4. CompTIA CASP+: Security Engineering and Cryptography In quantum cryptography, what is the main principle that ensures security? A. Heisenberg's Uncertainty Principle B. Shannon's theory of information C. Moore's law D. Kerckhoffs's principle None 5. CompTIA CASP+: Security Engineering and Cryptography Which cryptographic concept ensures that a message has not been altered during transmission? A. Confidentiality B. Integrity C. Non-repudiation D. Authentication None 6. CompTIA CASP+: Security Engineering and Cryptography What is the main purpose of using a cryptographic hash function? A. To encrypt and decrypt data B. To verify the authenticity of data C. To generate a fixed-size string from input data D. To establish a secure communication channel None 7. CompTIA CASP+: Security Engineering and Cryptography In the field of cryptography, what is the primary purpose of using an Elliptic Curve Cryptography ECC algorithm? A. To ensure data integrity B. To facilitate secure key exchange C. To provide digital signatures D. To enhance encryption strength with shorter key lengths None 8. CompTIA CASP+: Security Engineering and Cryptography Which of the following is a characteristic of a symmetric encryption algorithm? A. It uses different keys for encryption and decryption. B. It is primarily used for creating digital signatures. C. It is based on the concept of public and private key pairs. D. It uses the same key for both encryption and decryption. None 9. CompTIA CASP+: Security Engineering and Cryptography What is the primary advantage of implementing a Zero Trust network architecture? A. It simplifies network management. B. It eliminates the need for encryption. C. It minimizes the attack surface within the network. D. It reduces the need for regular software updates. None 10. CompTIA CASP+: Security Engineering and Cryptography In cryptography, what is the primary function of a Certificate Authority CA? A. To generate public and private keys B. To distribute digital certificates C. To validate user identities D. To issue and manage digital certificates None 11. CompTIA CASP+: Security Engineering and Cryptography Which cryptographic attack involves attempting all possible key combinations until the correct one is found? A. Man-in-the-middle attack B. Brute-force attack C. Dictionary attack D. Replay attack None 12. CompTIA CASP+: Security Engineering and Cryptography What is the primary purpose of using a Hardware Security Module (HSM) in a security infrastructure? A. To manage network configurations B. To enhance the physical security of servers C. To provide secure cryptographic key generation and storage D. To monitor and log security events None 13. CompTIA CASP+: Security Engineering and Cryptography In terms of security engineering, what is the main goal of implementing a Security Development Lifecycle (SDL)? A. To decrease software development time B. To enhance collaboration between development teams C. To integrate security practices into software development processes D. To reduce the cost of software development None 14. CompTIA CASP+: Security Engineering and Cryptography Which cryptographic protocol is designed to secure HTTP traffic on the Internet? A. SSH B. S/MIME C. TLS D. PGP None 15. CompTIA CASP+: Security Engineering and Cryptography What is the main security advantage of using blockchain technology? A. It simplifies the encryption process. B. It offers a centralized database management system. C. It provides a high level of data transparency. D. It ensures data immutability and tamper resistance. None 16. CompTIA CASP+: Security Engineering and Cryptography In security engineering, what is the primary purpose of an Intrusion Detection System (IDS)? A. To prevent unauthorized access to network resources B. To detect and alert on potential security threats and breaches C. To encrypt data transmissions D. To manage user access controls None 17. CompTIA CASP+: Security Engineering and Cryptography Which technology is essential for securing virtualized environments in a cloud infrastructure? A. Network Address Translation (NAT) B. Virtual Private Network (VPN) C. Virtual Machine Escape Protection D. Software-Defined Networking (SDN) None 18. CompTIA CASP+: Security Engineering and Cryptography In the context of secure software engineering, what is "fuzzing" used for? A. Performance testing B. User interface design C. Security vulnerability testing D. Network optimization None 19. CompTIA CASP+: Security Engineering and Cryptography Which cryptographic concept involves splitting data into parts, each of which is less sensitive, and only when combined do they reveal sensitive information? A. Data obfuscation B. Cryptographic hashing C. Secret sharing D. Key escrow None 20. CompTIA CASP+: Security Engineering and Cryptography What is the primary purpose of employing Forward Secrecy in a cryptographic communication protocol? A. To ensure data integrity B. To prevent the reuse of encryption keys C. To allow for non-repudiation D. To protect past sessions against future key compromises None 21. CompTIA CASP+: Security Engineering and Cryptography In the context of digital certificates, what does the term "certificate pinning" refer to? A. Associating a certificate with a specific IP address B. Hardcoding the certificate details in an application C. Regularly updating certificates D. Distributing certificates through a secure channel None 22. CompTIA CASP+: Security Engineering and Cryptography What is the primary security benefit of using containerization in application deployment? A. Enhanced network speed B. Reduced memory usage C. Isolation of application environments D. Simplified user authentication None 23. CompTIA CASP+: Security Engineering and Cryptography Which of the following best describes a rainbow table attack? A. A method of exploiting weak passwords through precomputed hashes B. An attack on wireless networks using a collection of pre-shared keys C. A technique for breaking encryption by trying every possible key D. An attack that uses large databases of common phrases to crack passwords None 24. CompTIA CASP+: Security Engineering and Cryptography In the context of secure communications, what is the primary function of the Diffie-Hellman algorithm? A. Digital signature creation B. Symmetric key encryption C. Secure key exchange D. Hashing of data None 25. CompTIA CASP+: Security Engineering and Cryptography What is the primary security concern associated with quantum computing and cryptography? A. Quantum computers can significantly reduce the effectiveness of current hashing algorithms. B. Quantum computers could potentially break many of the cryptographic algorithms currently in use. C. Quantum computing can interfere with electronic cryptographic devices. D. Quantum computing will make it difficult to generate random numbers for cryptographic keys. None 26. CompTIA CASP+: Security Engineering and Cryptography In Public Key Infrastructure (PKI), what role does the Registration Authority RA play? A. It issues digital certificates. B. It is responsible for the generation of public and private keys. C. It verifies the identity of entities requesting a certificate. D. It serves as the central repository for public keys. None 27. CompTIA CASP+: Security Engineering and Cryptography Which term describes the process of transforming plaintext into a non-readable form, known as ciphertext? A. Decryption B. Encoding C. Compression D. Encryption None 28. CompTIA CASP+: Security Engineering and Cryptography What is the main security objective of implementing an air-gapped computer or network? A. To prevent physical access to the system B. To isolate the system from unsecured networks C. To protect the system from electromagnetic interference D. To ensure high availability of the network None 29. CompTIA CASP+: Security Engineering and Cryptography Which type of cryptographic algorithm is primarily used for ensuring the confidentiality of data in transit? A. Hashing algorithms B. Digital signature algorithms C. Key exchange algorithms D. Encryption algorithms None 30. CompTIA CASP+: Security Engineering and Cryptography What is the primary purpose of employing Forward Secrecy in a cryptographic communication protocol? A. To ensure data integrity B. To prevent the reuse of encryption keys C. To allow for non-repudiation D. To protect past sessions against future key compromises None 1 out of 30 Time is Up! Time's up