Can you answer these Security+ encryption practice test questions related to symmetric and asymmetric encryption? You should if you plan to take the Security+ exam. This post should help.

**Q1.** Your network requires a secure method of sharing encryption keys over a public network. Which of the following is the BEST choice?

A. Symmetric encryption

B. Bcrypt

C. Diffie-Hellman

D. Steganography

Answer below.

**Q2.** Bart wants to send a secure email to Lisa so he decides to encrypt it. Bart wants to ensure that Lisa can verify that he sent it. Which of the following does Lisa need to meet this requirement?

A. Bart’s public key

B. Bart’s private key

C. Lisa’s public key

D. Lisa’s private key

Answer below.

**Q3.** Bart wants to send a secure email to Lisa so he decides to encrypt it. Bart wants to ensure that Lisa can decrypt it. Which of the following does Lisa need to decrypt it?

A. Bart’s public key

B. Bart’s private key

C. Lisa’s public key

D. Lisa’s private key

Answer below.

If these questions and answers aren’t clear to you, check out these posts:

## Security+ Encryption Practice Test Questions with Answers

**Q1.** Your network requires a secure method of sharing encryption keys over a public network. Which of the following is the BEST choice?

A. Symmetric encryption

B. Bcrypt

C. Diffie-Hellman

D. Steganography

Q1 Answer: **C** is correct. Diffie-Hellman allows entities to negotiate encryption keys securely over a public network.

Once the entities negotiate the keys, they use symmetric encryption, but they can’t share keys using symmetric encryption without first using a secure method such as Diffie-Hellman.

Bcrypt is a key stretching technique used by some Unix systems to make password cracking more difficult.

Steganography hides data within data, but it isn’t the best method of sharing encryption keys over a public network.

**Q2.** Bart wants to send a secure email to Lisa so he decides to encrypt it. Bart digitally signs it and wants to ensure that Lisa can verify that he sent it. Which of the following does Lisa need to meet this requirement?

A. Bart’s public key

B. Bart’s private key

C. Lisa’s public key

D. Lisa’s private key

Q2 Answer.** A** is correct. Lisa would decrypt the digital signature with Bart’s public key. The digital signature provides verification that Bart sent the message, non-repudiation, and integrity for the message.

Bart encrypts the digital signature with his private key, which can only be decrypted with his public key.

Lisa’s keys are not used for Bart’s digital signature, but might be used for the encryption of the email.

Although not part of this scenario, Bart would encrypt the email with Lisa’s public key and Lisa would decrypt the email with Lisa’s private key.

Q3. Bart wants to send a secure email to Lisa so he decides to encrypt it. Bart wants to ensure that Lisa can decrypt it. Which of the following does Lisa need to decrypt it?

A. Bart’s public key

B. Bart’s private key

C. Lisa’s public key

D. Lisa’s private key

Q3 Answer.** D** is correct. Lisa needs her private key to decrypt it.

Bart would encrypt the message with Lisa’s public key.

Bart encrypts the digital signature with his private key, which can only be decrypted with his public key.

Bart’s keys are not used for encrypting data that Lisa can decrypt.

If these questions and answers aren’t clear to you, check out these posts: