CompTIA Security+ Exam Prep - Question List

Select how would you like to study

176. What algorithm enables two systems to exchange a symmetric key securely without requiring a previous relationship?
  1. The Ericka Algorithm
  2. Cipher-based Algorithm
  3. Diffie-Hellman Algorithm
  4. The Middleton Algorithm
177. Jack is happy that he has not had to pay for e-mail security since 1991 because of Phil Zimmerman. What email security does Jack use?
  1. Multipurpose Internet Mail Extension (MIME)
  2. Privacy-Enhanced Mail (PEM)
  3. Message Security Protocol (MSP)
  4. Pretty Good Privacy (PGP)
178. Jeff keeps trying to successfully attack against an algorithm that has yet to be successfully attacked. What algorithm is Jeff attempting to attack?
  1. Blowfish
  2. International Data Encryption Algorithm (IDEA)
  3. RC4
  4. RC6
179. Cryptography is really an issue of mathematics being used to create code into an undecipherable form or algorithms. What algorithm is easier to perform than to decipher?
  1. El Gamal
  2. Elliptic Curve Cryptosystems
  3. One-Way Functions
  4. Knapsack
180. Cryptography is really an issue of mathematics being used to create code into an undecipherable form or algorithms. Which algorithm is the most efficient, is mathematically rich, and uses the least resources?
  1. El Gamal
  2. Elliptic Curve Cryptosystems
  3. One-Way Functions
  4. Knapsack

Select how would you like to study