Book Image

Security+® Practice Tests

By : Mike Chapple
Book Image

Security+® Practice Tests

By: Mike Chapple

Overview of this book

Security+ certification is the most popular entry-level certification for cybersecurity professionals. It has no work experience requirement, making it accessible to everyone willing to put in the time to prepare for the exam. Security+? Practice Tests are the perfect tools to prepare for the CompTIA Security+ exam. The first six chapters each cover one of the six Security+ domains. Each of those chapters contains around 100 practice test questions covering the material from that domain. The last two chapters each contain a full-length Security+ practice test that’s designed to assess your readiness to take the actual test. At the end of each chapter, you’ll find the answers to all of the questions along with detailed explanations to help reinforce your learning of the material. By the end of the book, you’ll have enough practice to easily ace the CompTIA Security+ exam.
Table of Contents (9 chapters)

Domain 6 Questions

  1. Adam created a message and then computed a message digest based upon that message. He then altered a single character at the end of the message and then recomputed the message digest. Which one of the following statements about the second message digest is correct?

    A. The second message digest should be one character different from the first digest.

    B. The second message digest will be completely different from the first digest.

    C. There may be minor differences in the second message digest,e but they will be toward the end of the digest.

    D. The two digests will essentially be the same, with minor differences.

  2. Which one of the following encryption algorithms does not rely upon the difficulty of factoring large prime numbers to achieve its secrecy?

    A. RSA

    B. PGP

    C. ECC

    D. Diffie-Hellman

  3. Helen is concerned about an attack that may retrieve credit card numbers from memory in a point-of-sale terminal. What term best describes this scenario?

    A. Data-in-transit

    B. Data-at...