Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

CompTIA ADR-001 Exam -

Free ADR-001 Sample Questions:

Q: 1
Signing data with a digital signature. (Select TWO)
A. allows it to be decrypted.
B. requires a public key to verify.
C. requires a private key to verify.
D. allows one to see if it has not been modified.
E. encrypts the data.
Answer: B,D

Q: 2
When implementing encryption which of the following is the MOST important factor to ensure it will be secure?
A. Key management
B. Ensuring the device has high entropy
C. Using AES over 3DES
D. Only implement on devices with GPU
Answer: A

Q: 3
When storing a PIN used to logon to the app, by applying a cryptographic hash function a developer will:
A. provide plausible deniability.
B. mitigate the salt used with the password.
C. mitigate the location of the encrypted data.
D. mitigate the password from being recovered.
Answer: D

Q: 4
When applying PBKDF2 to a password, what would be the MORE secure number of iterations to use?
A. 100
B. 1,000
C. 2,000
D. 10,000
Answer: D

Q: 5
What is the point of using an initialization vector in encryption? (Select TWO).
A. It stops readable patterns from forming
B. It creates randomization
C. It adds geometry to the encryption
D. It is required for any encryption process
E. It removes the need for the public key
Answer: A,B

Q: 6
A onetime pad is considered cryptographically secure, which are two ways it can be broken? (Select TWO).
A. By not having an accurate clock with the pad
B. If the repeated use of one pad occurs
C. By losing one of the complete pads
D. If too much randomness is used in the pad generation
E. If XOR is used to apply the one time pad
Answer: B,C

Q: 7
Session keys are useful because:
A. they temporarily provide a mechanism to maintain the state of user interaction.
B. they are generated on the Android device locally upon startup.
C. there is only one key to generate.
D. they are more secure than public/private keys.
Answer: A

Q: 8
In public key cryptography which problem can occur when the public key is transmitted?
A. The initialization vector can be determined
B. The public key can be replaced with a different one
C. The hash of the data can be decrypted with the private key
D. The private key can be calculated from the public one
Answer: B

Q: 9
A file with Unix permissions ‘700’ allows:
A. all users to read, write and execute.
B. full access to the app that created it and no other apps.
C. only the system and root access.
D. for protected storage on the shared SD card.
Answer: B

Q: 10
In the AndroidManifest.xml file which element is used to define the permissions an app is requesting access to?
A. <uses-permission>
B. <permission>
C. <grant-uri-permissions>
D. <activity>
Answer: A

© 2014, All Rights Reserved