CompTIA: Advanced Security Practitioner (CASP) Exam Prep - Question List

Select how would you like to study

111. Which of the following is a feature of asymmetric cryptography?
  1. Both encryption and authentication can take place without sharing private keys.
  2. This cryptography uses the best algorithm possible.
  3. Encryption occurs only when both sides are authenticated.
  4. Encryption is limited to shared keys.
112. Which of the following statements regarding the MD5 algorithm is NOT true?
  1. It uses a two-way hash.
  2. It offers better security than its predecessors.
  3. It uses a one-way hash.
  4. It uses a 32-bit hash for encryption.
113. What is the block size of the SHA-1 algorithm?
  1. 256 bits
  2. 64 bits
  3. 512 bits
  4. 128 bits
114. Which of the following Symmetric Algorithms uses a key size of up to 2,040 bits?
  1. Blowfish
  2. RC5
  3. IDEA
  4. CAST
115. David wants to use symmetric-key encryption to encrypt and decrypt data. How many keys will he need?
  1. 3
  2. 4
  3. 2
  4. 1

Select how would you like to study