Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 3 Part 2

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 291

Exam Question

The lack of entropy in the process of generating cryptographic keys improves the security of cryptographic algorithms.

A. True
B. False

Correct Answer

B. False

Question 292

Exam Question

Which of the following terms applies to the authentication process?

A. Digital certificate
B. MFA
C. Encryption
D. Security through obscurity
E. Hashing

Correct Answer

B. MFA

Question 293

Exam Question

Which of the following terms applies to the concept of data integrity?

A. MFA
B. Digital certificate
C. Hashing
D. Security through obscurity
E. Encryption

Correct Answer

C. Hashing

Question 294

Exam Question

Which cryptographic solution would be best suited for low-power devices?

A. ECC
B. EFS
C. SED
D. FDE

Correct Answer

A. ECC

Question 295

Exam Question

What is the purpose of steganography?

A. Checking data integrity
B. Verifying hash values
C. Hiding data within another piece of data
D. Encrypting data

Correct Answer

C. Hiding data within another piece of data

Question 296

Exam Question

Which of the algorithms listed below does not fall into the category of asymmetric encryption?

A. RSA
B. GPG
C. DSA
D. AES
E. DHE
F. ECDHE
G. PGP

Correct Answer

D. AES

Question 297

Exam Question

In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key (and vice versa).

A. True
B. False

Correct Answer

A. True

Question 298

Exam Question

A type of encryption scheme where the same key is used to encrypt and decrypt data is referred to as: (Select 3 answers)

A. Session-key encryption
B. Public-key encryption
C. Symmetric encryption
D. Asymmetric encryption
E. Secret-key encryption

Correct Answer

A. Session-key encryption
C. Symmetric encryption
E. Secret-key encryption

Question 299

Exam Question

Which of the block cipher modes listed below provides both data integrity and confidentiality?

A. CBC
B. GCM
C. ECB
D. CTR

Correct Answer

B. GCM

Question 300

Exam Question

Unlike stream ciphers which process data by encrypting individual bits, block ciphers divide data into separate fragments and encrypt each fragment separately.

A. True
B. False

Correct Answer

A. True