
015_Key Exchange - CompTIA Security+ SY0-701 - 1.4
Authored by Wayground Content
Computers
9th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a limitation of out-of-band key exchange?
It is impractical for internet-based communications.
It requires a high level of technical expertise.
It is faster than in-band key exchange.
It is more secure than symmetric key exchange.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a key management practice?
Using the same key for all users
Regularly rotating encryption keys
Storing keys in plain text
Sharing keys over unsecured channels
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
__________________ is used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an encryption scheme in which the encryption key is made public, but the decryption key is kept private.
Public key
Private key
Symmetric key
Hash function
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method uses asymmetric encryption to securely exchange a symmetric key?
In-band key exchange
Symmetric key exchange
Out-of-band key exchange
Public key cryptography
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a characteristic of symmetric encryption?
It uses a pair of keys: one public and one private.
It uses the same key for both encryption and decryption.
It is slower than asymmetric encryption.
It is primarily used for digital signatures.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a characteristic of session keys?
They are permanent and used for multiple sessions.
They are temporary and used for a single session.
They are used for encryption only.
They are shared among multiple users.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which encryption method uses the same key for both encryption and decryption?
Asymmetric encryption
Symmetric encryption
Hashing
Public key encryption
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?