CompTIA Security+ Domain 6: Cryptography and PKI Welcome to your CompTIA Security+ Domain 6: Cryptography and PKI 1. CompTIA Security+: Cryptography and PKI Which cryptographic attack involves attempting to decrypt a cipher by trying every possible key? A. Cipher text-only attack B. Known plaintext attack C. Chosen plaintext attack D. Brute force attack None 2. CompTIA Security+: Cryptography and PKI In asymmetric cryptography, what is the primary purpose of a digital signature? A. To ensure data confidentiality B. To verify the integrity and origin of the data C. To provide non-repudiation D. Both B and C None 3. CompTIA Security+: Cryptography and PKI Which cryptographic principle prevents the sender of a message from denying the message's content and transmission? A. Confidentiality B. Integrity C. Non-repudiation D. Authentication None 4. CompTIA Security+: Cryptography and PKI What is the main difference between symmetric and asymmetric encryption? A. The number of keys used for encryption and decryption B. The speed of the encryption process C. The types of algorithms used D. The ability to provide digital signatures None 5. CompTIA Security+: Cryptography and PKI In the context of public key infrastructure (PKI), what is the role of a Certificate Authority (C A. A) To issue and manage security credentials and public keys B. To provide secure, encrypted communication channels C. To store and archive all data encryption keys D. To authenticate users in a network None 6. CompTIA Security+: Cryptography and PKI Which of the following algorithms is not a symmetric key algorithm? A. AES B. DES C. RSA D. 3DES None 7. CompTIA Security+: Cryptography and PKI What cryptographic concept involves the use of two keys, a public key for encryption, and a private key for decryption? A. Symmetric encryption B. Hashing C. Asymmetric encryption D. Digital signature None 8. CompTIA Security+: Cryptography and PKI In cryptography, what is a 'collision'? A. When two different keys generate the same ciphertext B. When two different messages produce the same hash value C. A failure in the encryption algorithm D. An unauthorized interception of encrypted data None 9. CompTIA Security+: Cryptography and PKI Which cryptographic method is primarily used to ensure the integrity of data? A. Encryption B. Hashing C. Key exchange D. Digital signing None 10. CompTIA Security+: Cryptography and PKI In PKI, what is the main purpose of a key escrow? A. To speed up the encryption process B. To recover lost or compromised encryption keys C. To increase the strength of the encryption algorithm D. To authenticate users more efficiently None 11. CompTIA Security+: Cryptography and PKI What is the primary purpose of using a salt in cryptographic hashing? A. To encrypt the hash value B. To speed up the hashing process C. To ensure the uniqueness of each hash D. To compress the data before hashing None 12. CompTIA Security+: Cryptography and PKI In the context of PKI, what is the primary role of a Registration Authority (R A. A) Encrypting data B. Issuing digital certificates C. Authenticating entities before certificate issuance D. Generating key pairs None 13. CompTIA Security+: Cryptography and PKI What is the primary difference between stream ciphers and block ciphers in cryptography? A. The size of the keys used B. The way they process the plaintext C. The type of algorithms used for encryption D. The speed of encryption and decryption None 14. CompTIA Security+: Cryptography and PKI Which of the following best describes a man-in-the-middle attack in the context of cryptography? A. An attacker decrypts data without the knowledge of the sender or receiver. B. An attacker inserts themselves into a communication session between parties. C. An attacker uses brute force to crack encrypted data. D. An attacker creates a hash collision to alter data without detection. None 15. CompTIA Security+: Cryptography and PKI What is the primary function of the Diffie-Hellman algorithm in cryptography? A. Hashing data B. Digital signing C. Encrypting data D. Secure key exchange None 16. CompTIA Security+: Cryptography and PKI Which cryptographic protocol provides security for electronic data interchange (EDI) transactions? A. SSL/TLS B. SSH C. PGP D. SET (Secure Electronic Transaction) None 17. CompTIA Security+: Cryptography and PKI In cryptography, what is the main purpose of a Certificate Revocation List (CRL)? A. To list all issued certificates B. To list digital certificates that have been revoked C. To validate the chain of trust in a certificate D. To store public keys None 18. CompTIA Security+: Cryptography and PKI What cryptographic concept involves splitting data into parts where individual parts do not reveal the whole? A. Key escrow B. Data obfuscation C. Secret sharing D. Steganography None 19. CompTIA Security+: Cryptography and PKI Which property of cryptographic hash functions ensures that, if two different messages produce the same hash, it's computationally infeasible to find them? A. Collision resistance B. Pre-image resistance C. Second pre-image resistance D. Non-repudiation None 20. CompTIA Security+: Cryptography and PKI In the context of PKI, what does the term 'chain of trust' refer to? A. A series of trusted intermediaries between the user and the CA B. The sequence of encryption algorithms used for securing data C. The progression of symmetric keys used in a session D. The order in which cryptographic hashes are applied None 1 out of 20 Time is Up! Time's up