Exam Questions With Correct Answers
A business wants to use keys issued by a trusted third party to demonstrate to
| | | | | | | | | | | | | | |
potential customers that it is a legitimate organization. Which key is used to sign
| | | | | | | | | | | | | |
the certificate issued to the business?
| | | | |
A. Private key of the root CA
| | | | | |
B. Public key of the root CA
| | | | | |
C. Private key of the company
| | | | |
D. Public key of the company
| | | | |
Private key of the root CA | | | | |
A business wants to use keys issued by a trusted third party to demonstrate it is a
| | | | | | | | | | | | | | | |
legitimate organization to potential customers. Which key should the business
| | | | | | | | | | |
send to potential customers to prove its identity?
| | | | | | |
A. Private key of the root CA
| | | | | |
B. Public key of the root CA
| | | | | |
C. Private key of the company
| | | | |
D. Public key of the company
| | | | |
Public key of the company
| | | |
What should an administrator use to import and export all items written using
| | | | | | | | | | | | |
X.509 that are part of a chain of trust?
| | | | | | | |
A. CER |
B. Public Key Cryptography Standard (PKCS) #7
| | | | | |
C. Public Key Cryptography Standard (PKCS) #12
| | | | | |
D. RTF |
Public Key Cryptography Standard (PKCS) #12
| | | | |
, Which field displays the hash, or digest, of the certificate in an X.509 certificate?
| | | | | | | | | | | | |
A. Subject
|
B. Issuer
|
C. Version
|
D. Thumbprint
|
Thumbprint
Which certificate management process involves key recovery?
| | | | | |
A. Initialization
|
B. Issued
|
C. Cancellation
|
D. Hold
|
Issued
Which task does a root CA perform before publishing its own certificate?
| | | | | | | | | | |
A. Encrypting it with its private key
| | | | | |
B. Encrypting it with its public key
| | | | | |
C. Signing it with its private key
| | | | | |
D. Signing it with its public key
| | | | | |
Signing it with its private key
| | | | |
Which algorithm is used to generate the thumbprint of a certificate?
| | | | | | | | | |
A. RSA
|
B. 3DES
|
C. AES
|
D. SHA-1
|
SHA-1
Large volumes of plaintext need to be encrypted, and the encryption keys need to
| | | | | | | | | | | | |
be securely distributed. Which approach should be used for encryption and
| | | | | | | | | | | |
distribution?
A. Encrypt by using symmetric keys and distribute by using asymmetric keys
| | | | | | | | | | |