CompTIA Security Plus Mock Test Q826

A company wants to ensure that all aspects if data are protected when sending to other sites within the enterprise. Which of the following would ensure some type of encryption is performed while data is in transit?

A. SSH
B. SHA1
C. TPM
D. MD5

Correct Answer: C
Section: Application, Data and Host Security

Explanation:
Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key
generation and stores cryptographic keys, passwords, or certificates.

Incorrect Answers:
A: Secure Shell (SSH) is a tunneling protocol that uses encryption to establish a secure shell connection to a remote system. This allows a user to run commands on the remote
machine without being physically present at the machine.
B: SHA-1 is a version of Secure Hash Algorithm (SHA) and is a 160-bit (20-byte) hash algorithm that can be used for hashing. Hashing is not an encryption algorithm but the hash can
be used to verify that the data has not been altered. Cryptographic weaknesses were discovered in SHA-1 in 2005.
D: Message Digest 5 (MD5) is a 128-bit hash algorithm that can be used for hashing. Hashing is not an encryption algorithm but the hash can be used to verify that the data has not
been altered. This, however, is only one aspect of data protection.

References:
Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis, 2014, pp. 237, 271, 315-316
http://en.wikipedia.org/wiki/SHA-1