100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

401 SEC+ Exam Guaranteed Pass: Expert-Reviewed Questions for Top Performance and Success

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
25-12-2024
Written in
2024/2025

401 SEC+ Exam Guaranteed Pass: Expert-Reviewed Questions for Top Performance and Success

Institution
401 SEC+
Course
401 SEC+










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
401 SEC+
Course
401 SEC+

Document information

Uploaded on
December 25, 2024
Number of pages
21
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • 401 sec
  • 401 sec exam

Content preview

401 SEC+ Exam Guaranteed Pass: Expert Questions
from World-Leading Universities & Certified Global
Sources
When confidentiality is the primary concern, and a secure channel for key exchange is not
available, which of the following should be used for transmitting company documents?

A. Digital Signature

B. Symmetric

C. Asymmetric

D. Hashing - -correct ans- -Answer: C



Explanation:

Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric keys
are referred to as the public key and the private key. Asymmetric algorithms do not require
a secure channel for the initial exchange of secret keys between the parties.



A company is concerned that a compromised certificate may result in a man-in-the-middle
attack against backend financial servers. In order to minimize the amount of time a
compromised certificate would be accepted by other servers, the company decides to add
another validation step to SSL/TLS connections. Which of the following technologies
provides the FASTEST revocation capability?

A. Online Certificate Status Protocol (OCSP)

B. Public Key Cryptography (PKI)

C. Certificate Revocation Lists (CRL)

D. Intermediate Certificate Authority (CA) - -correct ans- -Answer: A



Explanation:

CRL (Certificate Revocation List) was first released to allow the CA to revoke certificates,
however due to limitations with this method it was succeeded by OSCP. The main

,advantage to OCSP is that because the client is allowed query the status of a single
certificate, instead of having to download and parse an entire list there is much less
overhead on the client and network



A technician wants to verify the authenticity of the system files of a potentially
compromised system. Which of the following can the technician use to verify if a system
file was compromised? (Select TWO).

A. AES

B. PGP

C. SHA

D. MD5

E. ECDHE - -correct ans- -Answer: C,D



Explanation:

Hashing is used to prove the integrity of data to prove that it hasn't been modified. Hashing
algorithms are used to derive a key mathematically from a message. The most common
hashing standards for cryptographic applications are the SHA and MD algorithms.



A security administrator must implement a secure key exchange protocol that will allow
company clients to autonomously exchange symmetric encryption keys over an
unencrypted channel. Which of the following MUST be implemented?

A. SHA-256

B. AES

C. Diffie-Hellman

D. 3DES - -correct ans- -



Which of the following must be kept secret for a public key infrastructure to remain secure?

A. Certificate Authority

, B. Certificate revocation list

C. Public key ring

D. Private ke - -correct ans- -Answer: D



Explanation:

The private key, which is also called the secret key, must be kept secret.



Which of the following allows an organization to store a sensitive PKI component with a
trusted third party?

A. Trust model

B. Public Key Infrastructure

C. Private key

D. Key escrow - -correct ans- -Answer: D



Explanation:

Sensitive PKI data, such as private keys, can be put into key escrow data. The key escrow
data can be kept at a trusted third party.

Key escrow is an arrangement in which the keys needed to decrypt encrypted data are held
in escrow so that, under certain circumstances, an authorized third party may gain access
to those keys. These third parties may include businesses, who may want access to
employees' private communications, or governments, who may wish to be able to view the
contents of encrypted communications



Which of the following is a requirement when implementing PKI if data loss is
unacceptable?

A. Web of trust

B. Non-repudiation

C. Key escrow

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
HesiAtiExpert Western Governor\'S University
View profile
Follow You need to be logged in order to follow users or courses
Sold
48
Member since
3 year
Number of followers
48
Documents
452
Last sold
11 months ago
Hesi and Ati Expert

I sell the actual recent screenshots of HESI and ATI exam with their correct answers. Incase of any concern, question and enquiry contact my email . All the best in your studies and Exam

4.9

85 reviews

5
83
4
0
3
1
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions