Section 1.4 Demonstrate your acquired knowledge about the importance of using appropriate cryptographicsolutions. This will demonstrate your proficiency for section 1.4 of the Security+ SY0-701 objectives. 1 / 25 What is a Certificate Signing Request (CSR) used for? Revoke existing certificates Request a certificate from a Certificate Authority Encrypt communication Generate a symmetric key 2 / 25 A wildcard certificate can secure which of the following? Only a single IP address Multiple subdomains of a domain One database field Any public domain 3 / 25 What defines the beginning of a chain of trust in certificate-based systems? Intermediate authority Root certificate Wildcard certificate Private key 4 / 25 A self-signed certificate lacks which important cryptographic trust element? Third-party validation Key generation Encryption Hashing 5 / 25 What protocol allows real-time status verification of a certificate? PKCS#12 OCSP Diffie-Hellman SHA-512 6 / 25 What is the function of a Certificate Revocation List (CRL)? Verifies certificate identity Extends key length Lists certificates that are no longer trusted Generates CSR files 7 / 25 Which component of a blockchain provides open visibility to all network participants? Encryption suite Public ledger HSM Root key 8 / 25 What is a primary benefit of blockchain in cryptographic applications? Encrypted compression Decentralized, immutable ledger of transactions Lightweight authentication Key revocation 9 / 25 Key stretching is a technique used to: Extend the file size for steganography Increase the time and complexity of password hashes to resist brute-force attacks Change symmetric key lengths Apply new salts 10 / 25 Which process ensures that a digital signature was created by a verified source? Public key verification Key escrow Hash comparison Salted hash 11 / 25 Which of the following techniques can provide data integrity? Encryption Hashing Tokenization Salting 12 / 25 Tokenization improves security by: Replacing sensitive data with non-sensitive substitutes Encrypting the entire database Generating certificates Applying symmetric encryption 13 / 25 What is the purpose of salting when hashing passwords? Preventing network attacks Making each hash unique to prevent rainbow table attacks Increasing file size Reducing hashing time 14 / 25 Which method hides data within another medium, such as an image file? Salting Obfuscation Steganography Masking 15 / 25 A hardware security module (HSM) is best used for: Compressing certificate files Securely generating, storing, and managing cryptographic keys Building secure tunnels Enabling wireless encryption 16 / 25 What cryptographic tool is integrated into a device’s motherboard for secure key storage and encryption operations? HSM TPM UEFI BIOS 17 / 25 Why is key length important in encryption algorithms? It shortens the processing time It helps with key escrow Longer keys increase resistance to brute-force attacks It determines the hash output 18 / 25 Which algorithm is typically used for secure key exchange in public channels? SHA-256 Diffie-Hellman AES RSA 19 / 25 What is the main difference between asymmetric and symmetric encryption? One is used for hashing, the other is not One uses a single key for all operations Asymmetric uses two keys, symmetric uses one Symmetric provides non-repudiation 20 / 25 Which of the following encryption levels would best protect a single record in a database? Volume Partition Record File 21 / 25 Full-disk encryption protects data: In emails only At rest across the entire storage medium Only when files are individually opened During transmission 22 / 25 What is the purpose of a key escrow? Prevent unauthorized access to certificates Securely store encryption keys for recovery or compliance Distribute hashing functions Hide cryptographic hashes 23 / 25 In PKI, which entity issues and manages digital certificates? Public key holder Certificate authority Digital signature engine Key management service 24 / 25 Which cryptographic method is typically used to encrypt bulk data due to performance? Asymmetric encryption Symmetric encryption Key escrow Digital signatures 25 / 25 What is the main purpose of using a public key in Public Key Infrastructure (PKI)? Encrypt sensitive emails Store certificates in a trust store Encrypt data that only the private key can decrypt Digitally sign data for confidentiality Your score isThe average score is 0% 0% Restart quiz Return to CompTia N+ 10-009 Objectives