The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 291
- Exam Question
- Correct Answer
- Question 292
- Exam Question
- Correct Answer
- Question 293
- Exam Question
- Correct Answer
- Question 294
- Exam Question
- Correct Answer
- Question 295
- Exam Question
- Correct Answer
- Question 296
- Exam Question
- Correct Answer
- Question 297
- Exam Question
- Correct Answer
- Question 298
- Exam Question
- Correct Answer
- Question 299
- Exam Question
- Correct Answer
- Question 300
- Exam Question
- Correct Answer
Question 291
Exam Question
The lack of entropy in the process of generating cryptographic keys improves the security of cryptographic algorithms.
A. True
B. False
Correct Answer
B. False
Question 292
Exam Question
Which of the following terms applies to the authentication process?
A. Digital certificate
B. MFA
C. Encryption
D. Security through obscurity
E. Hashing
Correct Answer
B. MFA
Question 293
Exam Question
Which of the following terms applies to the concept of data integrity?
A. MFA
B. Digital certificate
C. Hashing
D. Security through obscurity
E. Encryption
Correct Answer
C. Hashing
Question 294
Exam Question
Which cryptographic solution would be best suited for low-power devices?
A. ECC
B. EFS
C. SED
D. FDE
Correct Answer
A. ECC
Question 295
Exam Question
What is the purpose of steganography?
A. Checking data integrity
B. Verifying hash values
C. Hiding data within another piece of data
D. Encrypting data
Correct Answer
C. Hiding data within another piece of data
Question 296
Exam Question
Which of the algorithms listed below does not fall into the category of asymmetric encryption?
A. RSA
B. GPG
C. DSA
D. AES
E. DHE
F. ECDHE
G. PGP
Correct Answer
D. AES
Question 297
Exam Question
In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa).
A. True
B. False
Correct Answer
A. True
Question 298
Exam Question
A type of encryption scheme where the same key is used to encrypt and decrypt data is referred to as: (Select 3 answers)
A. Session-key encryption
B. Public-key encryption
C. Symmetric encryption
D. Asymmetric encryption
E. Secret-key encryption
Correct Answer
A. Session-key encryption
C. Symmetric encryption
E. Secret-key encryption
Question 299
Exam Question
Which of the block cipher modes listed below provides both data integrity and confidentiality?
A. CBC
B. GCM
C. ECB
D. CTR
Correct Answer
B. GCM
Question 300
Exam Question
Unlike stream ciphers which process data by encrypting individual bits, block ciphers divide data into separate fragments and encrypt each fragment separately.
A. True
B. False
Correct Answer
A. True