CompTIA Security+ Cryptography Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 617,279
Questions: 24 | Attempts: 687

SettingsSettingsSettings
CompTIA Security+ Cryptography Quiz! - Quiz

.


Questions and Answers
  • 1. 

    Which of the following statements about the SHA (Security Hash Algorithm) are true? 

    • A.

      Its latest version is SHA-1

    • B.

      Its latest version is SHA-4.1

    • C.

      It is used with encryption protocols

    • D.

      It is used with networking protocols

    Correct Answer(s)
    A. Its latest version is SHA-1
    C. It is used with encryption protocols
    Explanation
    SHA is a security hash algorithm that is used with encryption protocols. Its latest version is SHA-1.

    Rate this question:

  • 2. 

    Which of the following are encryption systems? 

    • A.

      RC5

    • B.

      Blowfish

    • C.

      MAC

    • D.

      ARP

    Correct Answer(s)
    A. RC5
    B. Blowfish
    Explanation
    RC5 and Blowfish are encryption systems. MAC is a type of hardware address. ARP is a protocol that resolves MAC address to IP address.

    Rate this question:

  • 3. 

    Which of the following is true about Public/Private key pairs? 

    • A.

      They form an essential part of Website security

    • B.

      They are used by Certificate security system

    • C.

      They are a pair of clear text passwords

    • D.

      They are obsolete.

    Correct Answer(s)
    A. They form an essential part of Website security
    B. They are used by Certificate security system
    Explanation
    They forma an essential part of Web site security system, as it is the most convenient security system for Web sites considering that clients would be accessing the Web site over the public network. The Certificate security system uses the basic logic of Public/Private key pairs.

    Rate this question:

  • 4. 

    RSA is the encryption system used in cellular devices. 

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    ECC is the encryption system used in cellular devices.

    Rate this question:

  • 5. 

    What is the requirement for cryptography?

    • A.

      To avoid unauthorized access of information being stored

    • B.

      To avoid unauthorized access of network resources

    • C.

      To avoid unauthorized access of information being transmitted.

    • D.

      To avoid unauthorized access of network servers

    Correct Answer(s)
    A. To avoid unauthorized access of information being stored
    C. To avoid unauthorized access of information being transmitted.
    Explanation
    Network resource access will have to be controlled through access permissions. Server access will have to be controlled through physical security to the server. Unauthorized access prevention of stored information or information being transmitted is the role of cryptography.

    Rate this question:

  • 6. 

    Which of the following is responsible for key issues relating to the security of inter-bank communications?

    • A.

      IETF

    • B.

      ISI

    • C.

      NSA

    • D.

      ABA

    Correct Answer
    D. ABA
    Explanation
    ABA concerns itself with key issues in providing security to financial transaction/communication between banks.

    Rate this question:

  • 7. 

    Which of the following will be required to perform Cryptanalysis?

    • A.

      Mathematical tools

    • B.

      Analytical reasoning

    • C.

      Pattern finding

    • D.

      Mathematical reasoning

    • E.

      Advanced calculators

    Correct Answer(s)
    A. Mathematical tools
    B. Analytical reasoning
    C. Pattern finding
    Explanation
    Cryptanalysis is a process of studying the pattern of secure communication and breaking it. It involves complex combinations such as patience and determination combined with skills of pattern finding, mathematical tools and analytical reasoning.

    Rate this question:

  • 8. 

    When employing Caesar's Cipher key value of 3, which of the following will be the decrypted equivalent of JGOOQ?

    • A.

      HELLO

    • B.

      WHAT

    • C.

      WHEN

    • D.

      DATE

    Correct Answer
    A. HELLO
    Explanation
    According to Caesar�s Cipher key value of 3, you would be sliding up the alphabetical value by 3. Hence �H� would be represented as J, �E� as G, �L� as O and �O� as Q.

    Rate this question:

  • 9. 

    Which of the following is an advantage of using conventional encryption?

    • A.

      It is the most secure

    • B.

      It is very fast

    • C.

      It is economical

    • D.

      None of the above

    Correct Answer
    B. It is very fast
    Explanation
    When conventional encryption is used for stored data rather than the data being transmitted, encryption and decryption process can be very fast.

    Rate this question:

  • 10. 

    The concept of public-key cryptography was introduced by Diffie-Hellman. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The issues with key distribution faced by conventional encryption was overcome by the Public-key cryptography concepts introduced by Diffie-Hellman.

    Rate this question:

  • 11. 

    Which of the following statements about Public Key Cryptography are true? 

    • A.

      You need to have a security setup configured on both the sending as well as the receiving ends to implement Public Key Cryptography.

    • B.

      You do not need an existing security setup

    • C.

      Public key can only encrypt and private key can only decrypt.

    • D.

      Public key can encrypt as well as decrypt, private key can only decrypt

    • E.

      None of the above

    Correct Answer(s)
    B. You do not need an existing security setup
    C. Public key can only encrypt and private key can only decrypt.
    Explanation
    The implementation of Public-key cryptography does not need any existing security measures to be implemented. The public key can only encrypt and the Private key can only decrypt.

    Rate this question:

  • 12. 

    The keys are measured by bytes. 

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Keys are measured by bits.

    Rate this question:

  • 13. 

    A digital signature is synonymous to which of the following?

    • A.

      Finger print

    • B.

      Hand written signature

    • C.

      Blood sample

    • D.

      None of the above

    Correct Answer
    B. Hand written signature
    Explanation
    A digital signature is synonymous with the handwritten signature. A signature though unique to that person varies with the person's age. Similarly, although a digital signature is unique and is used to establish the origin of that signature, it can vary from situation to situation.

    Rate this question:

  • 14. 

    When employing message digest, if data does get modified, which of the following will be the result of that modification?

    • A.

      The receiving end and the sending end will receive an alert notification

    • B.

      The resulting digest after data modification will contain a completely different value.

    • C.

      The messages will be dropped and retransmitted.

    • D.

      None of the above

    Correct Answer
    B. The resulting digest after data modification will contain a completely different value.
    Explanation
    When cryptography uses hash function on a plain text, a fixed length of data called the message digest is generated. This message digest helps to preserve the data integrity by generating a a digest value when the data was originally transmitted. If during transmission the data gests modified, the message digest value that will be resulting will be a totally different value from the original one. This is usually verified at the receiving end before accepting and confirming the receipt of data.

    Rate this question:

  • 15. 

    Which of the following are the two key-based algorithms?

    • A.

      Symmetric algorithm

    • B.

      Asymmetric algorithm

    • C.

      128-bit key algorithm

    • D.

      1024-bit key algorithm

    Correct Answer(s)
    A. Symmetric algorithm
    B. Asymmetric algorithm
    Explanation
    There are two types of key-based algorithms. Depending on the key pair types they use, they can be categorized as symmetric or asymmetric algorithms.

    Rate this question:

  • 16. 

    Which of the following can be termed as �brute force attack�?

    • A.

      Trying all combinations to break a code

    • B.

      Breaking into strong cryptography

    • C.

      Forcibly capturing all data being transmitted

    • D.

      None of the above

    Correct Answer
    A. Trying all combinations to break a code
    Explanation
    When a particular message has been encrypted using random combinations, a person who is capturing this message will have to try all combinations of deciphering possible to expose the original message. This is known as brute force attack.

    Rate this question:

  • 17. 

    Which of the following types of cryptography is possible? 

    • A.

      Cryptography with keys

    • B.

      Cryptography without keys

    • C.

      Cryptography before encryption

    • D.

      Cryptography without encryption

    Correct Answer(s)
    A. CryptograpHy with keys
    B. CryptograpHy without keys
    Explanation
    Cryptography without encryption and before encryption is not cryptography at all. Cryptography is possible with keys and without keys. When used without keys, it will be using simple or complex substitution.

    Rate this question:

  • 18. 

    Cryptography without keys is more secure than cryptography with keys. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Cryptography without keys is not at all secure as the deciphering program will reside on the same media where the data or message is being received. In case of thest, the data can be stolen along with the deciphering program.

    Rate this question:

  • 19. 

    Which of the following is required by the cipher when it is important to maintain a message as a secret?

    • A.

      Generate one cipher text for that message

    • B.

      Generate at least 5 cipher text for that message

    • C.

      Generate several cipher text.

    • D.

      None of the above.

    Correct Answer
    C. Generate several cipHer text.
    Explanation
    To keep a message a secret it is required that the cipher must be able to generate several cipher text.

    Rate this question:

  • 20. 

    Which of the following is the most common attack faced by the DES algorithm?

    • A.

      DoS

    • B.

      Brute force attack

    • C.

      Code attack

    • D.

      None of the above

    Correct Answer
    B. Brute force attack
    Explanation
    Brute force attack is the most common attack faced by the DES algorithm

    Rate this question:

  • 21. 

    Differential cryptanalysis is nothing but pattern studying.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Differential Cryptanalysis is nothing but pattern studying. It chooses a pair of plain text with specific differences.

    Rate this question:

  • 22. 

    Which of the following is provided by IDEA? 

    • A.

      High level security

    • B.

      Complex implementation

    • C.

      Ease of implementation

    • D.

      Average security level

    Correct Answer(s)
    A. High level security
    C. Ease of implementation
    Explanation
    IDEA provides high level of security along with ease of implementation.

    Rate this question:

  • 23. 

    Which of the following best describes Ron�s Code 2?

    • A.

      64-bit block cipher

    • B.

      128-bit block cipher

    • C.

      64-bit stream cipher

    • D.

      128-bit stream cipher

    Correct Answer
    A. 64-bit block cipHer
    Explanation
    RC2 or Ron�s code 2 is a 64-bit block cipher. It was devised by Ron Rivest.

    Rate this question:

  • 24. 

    The block size in RC5 can range from 0 to 255. Y/N?

    • A.

      Yes

    • B.

      No

    Correct Answer
    B. No
    Explanation
    The block size in RC5 can be 32-bit, 64-bit or 128-bit.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 05, 2006
    Quiz Created by
    Vaibhav Agarwal
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.