Review Questions

1. Hashing is used to test, prove, or verify which security service?

A. Authentication

B. Confidentiality

C. Integrity

D. Non-repudiation

2. Which of the following symmetric encryption algorithms offers the strength of 168-bit keys?

A. Data Encryption Standard

B. Triple DES

C. Advanced Encryption Standard

D. IDEA

3. Diffie-Hellman is what type of cryptographic system?

A. Asymmetric

B. Symmetric

C. Hashing

D. Certificate authority

4. The security service that protects the secrecy of data, information, or resources is known as what?

A. Integrity

B. Authentication

C. Non-repudiation

D. Confidentiality

5. Digital signatures can be created using all but which of the following?

A. Asymmetric cryptography

B. Hashing

C. Key escrow

Get CompTIA Security+™: Review Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.