CASP+ PRACTICE TEST 2025
QUESTIONS WITH CORRECT
ANSWERS
You have been asked by a member of senior management to explain the importance of
encryption and define what symmetric encryption offers. Which of the following offers
the best explanation?
A. Non-repudiation
B. Confidentiality
C. Hashing
D. Privacy and authentication - ....ANSWER ...-B
As the security administrator for your organization, you must be aware of all types of
hashing algorithms. Which algorithm was developed by Ron Rivest and offers a 128-bit
output?
A. AES
B. DES
C. MD5
...©️ 2025, ALL RIGHTS RESERVED 1
, D. RC4 - ....ANSWER ...-D
A coworker is concerned about the veracity of a claim because the sender of an email
denies sending it. The coworker wants a way to prove the authenticity of an email.
Which would you recommend?
A. Hashing
B. Digital signature
C. Symmetric encryption
D. Asymmetric encryption - ....ANSWER ...-B
A junior administrator at a sister company called to report a possible exposed private key
that is used for PKI transactions. The administrator would like to know the easiest way
to check whether the lost key has been flagged by the system. What are you going to tell
the administrator?
A. Hashing
B. Issuance to entities
C. Online Certificate Status Protocol
D. Wildcard verification - ....ANSWER ...-C
You've discovered that an expired certificate is being used repeatedly to gain logon
privileges. To what list should the certificate have been added?
...©️ 2025, ALL RIGHTS RESERVED 2
QUESTIONS WITH CORRECT
ANSWERS
You have been asked by a member of senior management to explain the importance of
encryption and define what symmetric encryption offers. Which of the following offers
the best explanation?
A. Non-repudiation
B. Confidentiality
C. Hashing
D. Privacy and authentication - ....ANSWER ...-B
As the security administrator for your organization, you must be aware of all types of
hashing algorithms. Which algorithm was developed by Ron Rivest and offers a 128-bit
output?
A. AES
B. DES
C. MD5
...©️ 2025, ALL RIGHTS RESERVED 1
, D. RC4 - ....ANSWER ...-D
A coworker is concerned about the veracity of a claim because the sender of an email
denies sending it. The coworker wants a way to prove the authenticity of an email.
Which would you recommend?
A. Hashing
B. Digital signature
C. Symmetric encryption
D. Asymmetric encryption - ....ANSWER ...-B
A junior administrator at a sister company called to report a possible exposed private key
that is used for PKI transactions. The administrator would like to know the easiest way
to check whether the lost key has been flagged by the system. What are you going to tell
the administrator?
A. Hashing
B. Issuance to entities
C. Online Certificate Status Protocol
D. Wildcard verification - ....ANSWER ...-C
You've discovered that an expired certificate is being used repeatedly to gain logon
privileges. To what list should the certificate have been added?
...©️ 2025, ALL RIGHTS RESERVED 2