CompTIA Security+ 1.4 General Security Concepts – Cryptographic Solutions

Posted by:

|

On:

|

Cryptographic Solutions

1 / 25

An organization wants to implement a cryptographic solution for secure communication between IoT devices with limited computational resources. Which of the following would be the MOST appropriate choice?

2 / 25

A security administrator needs to implement a solution to protect against weak password hashes in a legacy system that cannot be easily updated. Which of the following techniques would be MOST effective in strengthening the existing hashes?

3 / 25

An organization wants to implement a cryptographic solution that provides integrity and authentication for firmware updates on IoT devices. Which of the following would be the MOST appropriate solution?

4 / 25

Which of the following best describes the primary purpose of a Public Key Infrastructure (PKI)?

5 / 25

A company is implementing a blockchain-based system for supply chain management. Which of the following cryptographic techniques is MOST crucial for ensuring the integrity and immutability of the blockchain?

6 / 25

An organization is implementing a secure boot process for their IoT devices. Which of the following is MOST crucial for establishing a root of trust in this scenario?

7 / 25

An organization is implementing a blockchain-based system for supply chain management. Which of the following is a key characteristic of blockchain that ensures the integrity of the transaction history?

8 / 25

A security engineer is designing a system to protect against quantum computing attacks on current cryptographic systems. Which of the following approaches would be MOST effective in preparing for this threat?

9 / 25

An organization wants to implement a cryptographic solution that provides integrity for log files, ensuring they haven’t been tampered with. Which of the following would be the MOST appropriate solution?

10 / 25

A company is implementing a secure communication channel between two remote offices. They want to ensure perfect forward secrecy. Which of the following key exchange algorithms should they use?

11 / 25

An organization is implementing a new PKI system. They want to ensure that certificate revocation information is available in real-time to clients, while minimizing the load on their infrastructure. Which of the following technologies would BEST meet these requirements?

12 / 25

A security analyst is investigating a potential breach where an attacker may have gained access to encrypted data and the encryption key. The organization uses a key management system. Which of the following actions would BEST mitigate the risk of data exposure in this scenario?

13 / 25

A company wants to implement end-to-end encryption for its messaging application. Which of the following protocols would be MOST suitable for this purpose?

14 / 25

A security administrator needs to implement a solution to protect against rainbow table attacks on password hashes. Which of the following techniques would be MOST effective?

15 / 25

An organization is implementing a new authentication system and wants to use a secure method for storing user passwords. Which of the following techniques would provide the BEST protection against password cracking attempts?

16 / 25

A security engineer is implementing a system to securely store encryption keys for a large-scale enterprise application. Which of the following would be the MOST secure solution for this purpose?

17 / 25

A security engineer is designing a system to securely store and manage encryption keys for a cloud-based application. The solution should provide high availability and scalability. Which of the following would be the MOST appropriate choice?

18 / 25

Which cryptographic technique is best suited for providing non-repudiation in digital communications?

19 / 25

An organization wants to implement a cryptographic solution that provides confidentiality, integrity, and non-repudiation for email communications. Which of the following technologies would BEST meet these requirements?

20 / 25

A security architect is designing a system where sensitive data needs to be securely stored and processed within a specific hardware boundary, isolated from the rest of the system. Which of the following technologies would BEST meet this requirement?

21 / 25

An organization wants to implement a solution to protect sensitive data in their database while still allowing certain operations to be performed on the encrypted data. Which of the following encryption techniques would be MOST appropriate for this scenario?

22 / 25

A security engineer is designing a system to protect sensitive data at rest. Which of the following encryption levels would provide the MOST comprehensive protection?

23 / 25

An organization wants to implement a cryptographic solution that provides confidentiality for data in transit but has minimal impact on performance. Which of the following encryption types would be MOST appropriate?

24 / 25

A security architect is designing a system where multiple certificates need to be issued for subdomains of a main domain. Which of the following certificate types would be MOST efficient for this purpose?

25 / 25

A security architect is designing a system where sensitive data needs to be transmitted securely between two parties, but the parties do not have a pre-established shared secret. Which of the following key exchange methods would be MOST appropriate in this scenario?

Your score is

Exit