015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

9th Grade

18 Qs

quiz-placeholder

Similar activities

Transport Layer Security

Transport Layer Security

University

20 Qs

Unit 11: Software and hardware security measures

Unit 11: Software and hardware security measures

12th Grade

20 Qs

AP-CSP Unit 4 Test Review

AP-CSP Unit 4 Test Review

11th - 12th Grade

21 Qs

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

Computer and Network Security

Computer and Network Security

10th Grade

20 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

015_Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

Assessment

Quiz

Computers

9th Grade

Easy

Created by

Quizizz Content

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A portable laptop is running Windows 10 Pro. A user enables BitLocker on Drive D. Which of the following statements is true? If the user copies of filed to a network share, it remains encrypted. If the user copies a file to an unencrypted USB drive, the file remains encrypted. The files will be automatically decrypted when the drive is installed in another computer. All of these statements are true. None of these statements are true.

If the user copies of filed to a network share, it remains encrypted.

If the user copies a file to an unencrypted USB drive, the file remains encrypted.

The files will be automatically decrypted when the drive is installed in another computer.

None of these statements are true.

Answer explanation

BitLocker is a full disc encryption solution. BitLocker protects a drive, and the file starts on the drive against Data Theft if the device is lost or stolen.

However, the files are only protected while they reside on the drive.

These files lose their encryption when they are copied to a network share or an unencrypted Drive.

As a result, your files will not stay encrypted if you copy them to a network share or a USB disk.

You would have to use another encryption method for a network share or USB storage.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key management practice?

Using the same key for all users

Regularly rotating encryption keys

Storing keys in plain text

Sharing keys over unsecured channels

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The human resources organization want to ensure that stored employee data is encrypted. Which security mechanism would they use?

Encryption at rest

Data masking

Access control

Network segmentation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main advantage of using public key infrastructure (PKI)?

It provides a framework for managing digital certificates and keys.

It eliminates the need for encryption altogether.

It allows for unlimited data storage without security risks.

It simplifies the process of password recovery.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hardware component is designed for cryptographic functions on modern motherboards?

Secure Enclave

Key Management Systems (KMS)

Hardware Security Module (HSM)

Trusted Platform Module (TPM)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to locate hardware in secure locations?

To enhance network performance

To protect against physical theft and tampering

To reduce energy consumption

To improve software compatibility

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of symmetric encryption?

It uses a pair of keys: one public and one private.

It uses the same key for both encryption and decryption.

It is slower than asymmetric encryption.

It is primarily used for digital signatures.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?