nerdexam
CompTIACompTIA

SY0-501 · Question #372

SY0-501 Question #372: Real Exam Question with Answer & Explanation

The correct answer is D: Poor implementation. Despite utilizing strong and modern TLS cipher suite components like AES-GCM-256, SHA-384, and ECDSA, an information loss breach is most likely attributed to flaws in the system's overall security implementation.

Submitted by brentm· Mar 4, 2026

Question

A web server, which is configured to use TLS with AES-GCM-256, SHA-384, and ECDSA, recently suffered an information loss breach. Which of the following is MOST likely the cause?

Options

  • AInsufficient key bit length
  • BWeak cipher suite
  • CUnauthenticated encryption method
  • DPoor implementation

Explanation

Despite utilizing strong and modern TLS cipher suite components like AES-GCM-256, SHA-384, and ECDSA, an information loss breach is most likely attributed to flaws in the system's overall security implementation.

Common mistakes.

  • A. AES-GCM-256 utilizes a 256-bit key, which is considered a very strong key length and not insufficient.
  • B. The combination of AES-GCM-256 for encryption, SHA-384 for hashing, and ECDSA for digital signatures constitutes a strong and modern cipher suite, not a weak one.
  • C. AES-GCM (Galois/Counter Mode) is an authenticated encryption with associated data (AEAD) mode, meaning it provides both confidentiality and data integrity/authentication, thus it is not an unauthenticated encryption method.

Concept tested. Secure implementation vs. strong cryptographic primitives

Reference. https://learn.microsoft.com/en-us/windows-server/security/tls/tls-advanced-settings-config

Community Discussion

No community discussion yet for this question.

Full SY0-501 PracticeBrowse All SY0-501 Questions