Master encryption algorithms, hashing functions, digital signatures, and the PKI trust model โ with scenario-based quizzes and an algorithm selector tool built for SY0-701.
๐ฏ Take the Practice QuizDomain 1 (General Security Concepts) is 12% of the SY0-701 exam. Cryptography questions focus on which algorithm to use when and why โ understanding the trade-offs between speed, security, and use case.
Same key encrypts and decrypts. Fast and efficient โ ideal for bulk data encryption. The key distribution problem is the core challenge.
Different keys for encryption and decryption. Solves key distribution but is computationally slow โ used for key exchange and digital signatures, not bulk data.
Produces a fixed-length digest from any input. Cannot be reversed. Used to verify integrity โ not for confidentiality. A changed file = a different hash.
Public Key Infrastructure โ the system of CAs, certificates, and revocation mechanisms that lets the internet trust asymmetric keys at scale.
The exam rarely asks you to know algorithm internals โ it asks you to choose the right tool for the job. Symmetric = fast bulk encryption. Asymmetric = key exchange and signatures (slow). Hashing = integrity, never confidentiality. PKI = how trust is established. Know the purpose and limits of each.
The algorithms, attributes, and exam traps for each cryptographic category on SY0-701.
Filter by category or view all. The exam tests your ability to select the right cryptographic tool โ mastering the differences is the key to full-credit scenario answers.
| Criterion | ๐ Symmetric | ๐ Asymmetric | ๐ Hashing | ๐ PKI |
|---|---|---|---|---|
| Primary Purpose | Confidentiality โ bulk data encryption with speed | Key exchange, digital signatures, and small-data encryption | Integrity verification โ detect tampering, no confidentiality | Trust infrastructure โ bind identities to public keys at scale |
| Key Type | Single shared secret key (both parties must have it) | Key pair: public key (shared openly) + private key (never shared) | No key (or optional secret key for HMAC) | Asymmetric key pair + CA-signed certificate binding |
| Reversible? | โ Yes โ decrypt with the same key | โ Yes โ decrypt with private key (or public, depending on direction) | โ No โ one-way function, cannot decrypt | โ Yes (encryption) / โ No (certificate signatures are one-way verification) |
| Speed | โก Fast โ hardware-accelerated AES | ๐ Slow โ computationally expensive | โก Very fast | Variable โ depends on underlying asymmetric operations |
| Current Algorithms | AES-128/256, ChaCha20 | RSA-2048+, ECC (ECDSA/ECDHE), DHE | SHA-256, SHA-3, HMAC-SHA256, bcrypt/Argon2 (passwords) | X.509 v3, RSA or ECC key pairs, SHA-256 signatures |
| Broken/Deprecated | DES (56-bit), 3DES (phasing out), RC4 (stream, broken) | RSA <1024-bit (broken), DSA with weak parameters | MD5 (collision broken), SHA-1 (deprecated 2017) | SHA-1 signed certs (revoked), self-signed certs (untrusted) |
| Security Goals | Confidentiality only | Confidentiality + Authentication + Non-repudiation | Integrity only (+ Authentication with HMAC) | Authentication + Integrity (enables all CIA triad via TLS) |
| Exam Keyword | "Fast bulk encryption," "shared key," "AES" = Symmetric | "Key exchange," "non-repudiation," "digital signature," "ECC" = Asymmetric | "Integrity," "detect tampering," "one-way," "password storage" = Hashing | "Certificate," "CA," "revocation," "trust chain," "TLS" = PKI |
Read each scenario and identify the correct cryptographic answer before checking the breakdown.
10 scenario-based questions with per-category breakdown โ built around actual SY0-701 scenario question patterns.
Answer 2โ3 questions to identify the most appropriate cryptographic approach for your scenario.
Click each card to flip it and reveal the mnemonic.
๐ Tap a card to flip
| If the exam saysโฆ | Key detail | Answer |
|---|---|---|
| "Bulk encryption," "encrypt large data," "fast" | Shared key, one direction | AES (Symmetric) |
| "Legacy symmetric," "being phased out," "payment systems" | 3ร DES, slow, deprecated | 3DES |
| "56-bit key," "broken symmetric" | Original DES, brute-forceable | DES โ Broken |
| "Key exchange," "shared secret without transmitting it" | DH/DHE/ECDHE โ not encryption | Diffie-Hellman |
| "Non-repudiation," "cannot deny," "digital signature" | Hash + private key | Digital Signature (RSA/ECDSA) |
| "Same strength, smaller key," "mobile / IoT" | 256-bit ECC โ 3072-bit RSA | ECC |
| "Detect tampering," "verify integrity," "one-way" | No key, fixed-length output | SHA-256 / SHA-3 |
| "Broken hash," "collision attack" | MD5 (128-bit) or SHA-1 (160-bit) | MD5 / SHA-1 โ Broken |
| "Password storage," "salt," "resistant to brute-force" | Slow by design, salted | bcrypt / Argon2 |
| "Hash with authentication," "API integrity," "TLS record" | Keyed hash, shared secret | HMAC |
| "Certificate authority," "trust chain," "CA signs cert" | Binds public key to identity | PKI / X.509 |
| "Certificate revoked," "invalidate cert early" | List-based revocation | CRL |
| "Real-time revocation check," "OCSP Stapling" | Live status query to CA | OCSP |
| "Past sessions safe if key compromised later" | Ephemeral key exchange | Perfect Forward Secrecy (DHE/ECDHE) |