CompTIA Security+ Exam Prep - Question List

Select how would you like to study

181. Cryptography is really an issue of mathematics being used to put code into an undecipherable form or algorithms. Which algorithm takes a variable-length string and message and produces a fixed-length value?
  1. El Gamal
  2. Elliptic Curve Cryptosystems
  3. One-Way Functions
  4. One-Way Hash
182. What prevents a pattern in Cipher Block Chaining mode by taking the value of one block and adding it to the next block value within the algorithm?
  1. Cipher Feedback Mode
  2. Cipher Block Chaining (CBC)
  3. Counter Mode (CTR)
  4. Output Feedback Mode (OFB)
183. Which of the following is a feature of Asymmetric cryptography?
  1. Both encryption and authentication can take place without sharing private keys.
  2. This cryptography uses the best algorithm possible.
  3. Encryption occurs only when both sides are authenticated.
  4. Encryption is limited to shared keys.
184. Which of the following statements regarding the MD5 algorithm is NOT true?
  1. It uses a two-way hash.
  2. It offers better security than its predecessors.
  3. It uses a one-way hash.
  4. It uses a 32-bit hash for encryption.
185. Which of the following organizations is responsible for issuing and maintaining digital certificates?
  1. Certification Authority
  2. Certificate Company
  3. Certificate Storage
  4. Certificate Agency

Select how would you like to study