2
CompTIA Security+ SY0-701 Exam - Encryption Quiz with || || || || || || || ||
accurate solutions ||
Which of the following answers refers to a data storage device equipped with hardware-level
|| || || || || || || || || || || || || ||
encryption functionality? ||
HSM
TPM
EFS
SED
SED - Self-encrypting drive
|| || ||
Which of the answers listed below refers to software technology designed to provide
|| || || || || || || || || || || || ||
confidentiality for an entire data storage device? || || || || || ||
TPM
FDE
EFS
HSM
FDE - Full-disk encryption
|| || ||
An MS Windows component that enables encryption of individual files is called:
|| || || || || || || || || || ||
SED
EFS
BitLocker
FDE
EFS - Encryption file system
|| || || ||
, 2
Which of the following software application tools are specifically designed for implementing
|| || || || || || || || || || || ||
encryption algorithms to secure data communication and storage? (Select 2 answers)
|| || || || || || || || || ||
VPN
GPG
SSH
IPsec
PGP
GPG
PGP
What is the name of a network protocol that secures web traffic via SSL/TLS encryption?
|| || || || || || || || || || || || || ||
SFTP
HTTPS
FTPS
SHTTP
HTTPS
A network protocol that enables secure file transfer over SSH is known as:
|| || || || || || || || || || || ||
TFTP
SFTP
Telnet
FTPS
SFTP
CompTIA Security+ SY0-701 Exam - Encryption Quiz with || || || || || || || ||
accurate solutions ||
Which of the following answers refers to a data storage device equipped with hardware-level
|| || || || || || || || || || || || || ||
encryption functionality? ||
HSM
TPM
EFS
SED
SED - Self-encrypting drive
|| || ||
Which of the answers listed below refers to software technology designed to provide
|| || || || || || || || || || || || ||
confidentiality for an entire data storage device? || || || || || ||
TPM
FDE
EFS
HSM
FDE - Full-disk encryption
|| || ||
An MS Windows component that enables encryption of individual files is called:
|| || || || || || || || || || ||
SED
EFS
BitLocker
FDE
EFS - Encryption file system
|| || || ||
, 2
Which of the following software application tools are specifically designed for implementing
|| || || || || || || || || || || ||
encryption algorithms to secure data communication and storage? (Select 2 answers)
|| || || || || || || || || ||
VPN
GPG
SSH
IPsec
PGP
GPG
PGP
What is the name of a network protocol that secures web traffic via SSL/TLS encryption?
|| || || || || || || || || || || || || ||
SFTP
HTTPS
FTPS
SHTTP
HTTPS
A network protocol that enables secure file transfer over SSH is known as:
|| || || || || || || || || || || ||
TFTP
SFTP
Telnet
FTPS
SFTP