Crypto Toolkit
Analyze cryptographic scenarios and choose the right algorithm, hash function, or certificate type for the job. This lab tests your understanding of when and why to apply specific cryptographic solutions — the decision-making that Objective 1.4 demands.
What You’ll Practice
- Selecting symmetric vs. asymmetric algorithms based on use case (bulk encryption, key exchange, digital signatures)
- Identifying correct hashing approaches for passwords, integrity verification, and recognizing hash attacks
- Evaluating certificate types, PKI trust chains, and revocation mechanisms
- Applying cryptographic properties like Perfect Forward Secrecy, authenticated encryption, and key stretching
How the Exam Tests This
Objective 1.4 covers cryptographic solutions including symmetric/asymmetric algorithms, hashing, PKI, and certificate management. CompTIA presents scenario-based questions where you must select the appropriate algorithm for a given situation, identify weaknesses in a cryptographic implementation, or determine the correct certificate type. Expect questions that require you to distinguish between AES and RSA use cases, understand why MD5 is unsuitable for security purposes, and recognize PKI concepts like certificate chaining, revocation, and self-signed certificates.
Scoring
Each of the four sections (Symmetric/Asymmetric Selection, Hashing Scenarios, Certificate & PKI Decisions, Applied Crypto) contains 3-4 questions. One point per correct answer. Final score shows overall percentage and per-section breakdown.
MISSION
Choose the right cryptographic tool for the job — or leave the door wide open.
You'll face real-world scenarios across four domains of applied cryptography. For each one, select the correct algorithm, hash function, or certificate type and learn why the alternatives fail.
SECTIONS
- 4 questions: SYMMETRIC VS. ASYMMETRIC SELECTION
- 4 questions: HASHING SCENARIOS
- 4 questions: CERTIFICATE & PKI DECISIONS
- 4 questions: APPLIED CRYPTO SCENARIOS
HOW IT WORKS
Read the scenario — each presents a real decision a security professional faces.
Pick the best answer — four choices, one correct. After answering, a detailed explanation and "Why it matters" panel explain the reasoning.
Questions are shuffled within each section on every attempt.