CompTIA Security+ (SY0-701) Exam Objectives Master Set || || || || || || ||
questions with accurate detailed solutions || || || ||
Public key infrastructure (PKI) - correct answer✔✔A system that manages the creation,
|| || || || || || || || || || || ||
distribution, and revocation of digital certificates. || || || || ||
Public key - correct answer✔✔A cryptographic key that is used for encryption and verifying
|| || || || || || || || || || || || || ||
digital signatures in asymmetric encryption.
|| || || ||
Private key - correct answer✔✔A cryptographic key that is used for decryption and creating
|| || || || || || || || || || || || || ||
digital signatures in asymmetric encryption.
|| || || ||
Key escrow - correct answer✔✔A process where a trusted third party holds a copy of an
|| || || || || || || || || || || || || || || ||
encryption key. ||
Encryption - correct answer✔✔The process of converting plaintext into ciphertext to protect data
|| || || || || || || || || || || || ||
confidentiality.
Full-disk encryption - correct answer✔✔The process of encrypting the entire disk to protect all
|| || || || || || || || || || || || || ||
data stored on it.
|| || ||
Partition encryption - correct answer✔✔The process of encrypting a specific partition on a disk.
|| || || || || || || || || || || || ||
File encryption - correct answer✔✔The process of encrypting individual files to protect their
|| || || || || || || || || || || || ||
contents.
Volume encryption - correct answer✔✔The process of encrypting a logical volume, which can
|| || || || || || || || || || || || ||
span multiple disks or partitions.
|| || || ||
,2
Database encryption - correct answer✔✔The process of encrypting a database to protect its
|| || || || || || || || || || || || ||
contents.
Record encryption - correct answer✔✔The process of encrypting individual records within a
|| || || || || || || || || || || ||
database.
Transport/communication encryption - correct answer✔✔The process of encrypting data during || || || || || || || || || ||
transmission to ensure its confidentiality. || || || ||
Asymmetric encryption - correct answer✔✔A cryptographic system that uses two different keys:
|| || || || || || || || || || || ||
a public key for encryption and a private key for decryption.
|| || || || || || || || || ||
Symmetric encryption - correct answer✔✔A cryptographic system that uses the same key for
|| || || || || || || || || || || || ||
both encryption and decryption.
|| || ||
Key exchange - correct answer✔✔The process of securely sharing encryption keys between
|| || || || || || || || || || || ||
parties.
Algorithms - correct answer✔✔Mathematical functions used in encryption and decryption
|| || || || || || || || || ||
processes.
Key length - correct answer✔✔The size of the encryption key, measured in bits.
|| || || || || || || || || || || ||
Trusted Platform Module (TPM) - correct answer✔✔A hardware component that provides secure
|| || || || || || || || || || || ||
storage and cryptographic functions.
|| || ||
Hardware security module (HSM) - correct answer✔✔A physical device that generates, stores,
|| || || || || || || || || || || ||
and manages cryptographic keys.
|| || ||
,2
Key management system - correct answer✔✔A system that handles the generation, storage, and
|| || || || || || || || || || || || ||
distribution of cryptographic keys. || || ||
Secure enclave - correct answer✔✔A secure area within a processor that protects sensitive data.
|| || || || || || || || || || || || ||
Obfuscation - correct answer✔✔The process of making something unclear or difficult to
|| || || || || || || || || || || ||
understand.
Steganography - correct answer✔✔The process of hiding secret information within an innocent-
|| || || || || || || || || || ||
looking carrier file. || ||
Tokenization - correct answer✔✔The process of replacing sensitive data with a non-sensitive
|| || || || || || || || || || || ||
token.
Data masking - correct answer✔✔The process of modifying sensitive data to protect its
|| || || || || || || || || || || || ||
confidentiality.
Hashing - correct answer✔✔The process of converting data into a fixed-size string of characters.
|| || || || || || || || || || || || ||
Salting - correct answer✔✔The process of adding random data to the input of a hash function to
|| || || || || || || || || || || || || || || || ||
prevent precomputed attacks.
|| ||
Digital signatures - correct answer✔✔A cryptographic mechanism to verify the authenticity and
|| || || || || || || || || || || ||
integrity of digital documents.|| || ||
Key stretching - correct answer✔✔A technique to make a cryptographic key more resistant to
|| || || || || || || || || || || || || ||
brute-force attacks. ||
Blockchain - correct answer✔✔A distributed ledger that records transactions across multiple
|| || || || || || || || || || ||
computers.
, 2
Open public ledger - correct answer✔✔A transparent and publicly accessible record of all
|| || || || || || || || || || || || ||
transactions in a blockchain. || || ||
Certificates - correct answer✔✔Digital documents that bind a public key to an entity.
|| || || || || || || || || || || ||
Certificate authorities - correct answer✔✔Entities that issue and sign digital certificates.
|| || || || || || || || || ||
Certificate revocation lists (CRLs) - correct answer✔✔Lists of revoked digital certificates.
|| || || || || || || || || ||
Online Certificate Status Protocol (OCSP) - correct answer✔✔A protocol for checking the
|| || || || || || || || || || || ||
revocation status of digital certificates.
|| || || ||
Self-signed - correct answer✔✔A digital certificate that is signed by its own private key.
|| || || || || || || || || || || || ||
Third-party Certificate - correct answer✔✔A digital certificate that is signed by a trusted third-
|| || || || || || || || || || || || ||
party certificate authority.
|| ||
Root of trust - correct answer✔✔A trusted entity or component that forms the basis of a security
|| || || || || || || || || || || || || || || || ||
system.
Certificate signing request (CSR) generation - correct answer✔✔The process of creating a
|| || || || || || || || || || || ||
request for a digital certificate.
|| || || ||
Wildcard - correct answer✔✔A type of digital certificate that can be used for multiple
|| || || || || || || || || || || || || ||
subdomains.
Confidentiality - correct answer✔✔The principle of protecting data from unauthorized access.
|| || || || || || || || || ||