Cryptography Pre -Assessment
Attempt #2
Status: Passed
1. A business wants to use keys issued by a trusted third party to demonstrate to potential customers that it is a
legitimate organization.
Which key is used to sign the certificate issued to the business?
YOUR CORRECT
ANSWER ANSWER
Private key of the root CA
Public key of the root CA
Private key of the company
Public key of the company
2. A business wants to use keys issued by a trusted third party to demonstrate it is a legitimate organization to
potential customers.
Which key should the business send to potential customers to prove its identity?
YOUR CORRECT
ANSWER ANSWER
Private key of the root CA
Public key of the root CA
Private key of the company
Public key of the company
3. What should an administrator use to import and export all items written using X.509 that are part of a chain
of trust?
YOUR CORRECT
ANSWER ANSWER
CER
Public Key Cryptography Standard (PKCS) #7
Public Key Cryptography Standard (PKCS) #12
1/17
, YOUR CORRECT
ANSWER ANSWER
RTF
4. Which field displays the hash, or digest, of the certificate in an X.509 certificate?
YOUR CORRECT
ANSWER ANSWER
Subject
Issuer
Version
Thumbprint
5. Which certificate management process involves key recovery?
YOUR CORRECT
ANSWER ANSWER
Initialization
Issued
Cancellation
Hold
6. Which task does a root CA perform before publishing its own certificate?
YOUR CORRECT
ANSWER ANSWER
Encrypting it with its private key
Encrypting it with its public key
Signing it with its private key
Signing it with its public key
7. Which algorithm is used to generate the thumbprint of a certificate?
YOUR CORRECT
ANSWER ANSWER
RSA
3DES
2/17
, YOUR CORRECT
ANSWER ANSWER
AES
SHA-1
8. Large volumes of plaintext need to be encrypted, and the encryption keys need to be securely distributed.
Which approach should be used for encryption and distribution?
YOUR CORRECT
ANSWER ANSWER
Encrypt by using symmetric keys and distribute by using asymmetric keys
Encrypt by using asymmetric keys and distribute by using symmetric keys
Encrypt by using symmetric keys and distribute by using symmetric keys
Encrypt by using asymmetric keys and distribute by using asymmetric
keys
9. What is the role of a key in asymmetric encryption and decryption?
YOUR CORRECT
ANSWER ANSWER
A public key is used for both encryption and decryption.
A private key is used for both encryption and decryption.
A public key is used for encryption, and a private key is used for
decryption.
A private key is used for encryption, and a public key is used for
decryption.
10. A security analyst is validating the integrity and authenticity of a data transaction.
Which PKI component is being used?
YOUR CORRECT
ANSWER ANSWER
Digital certificate
Digital signature
Asymmetric encryption
Symmetric encryption
3/17