MCSA Exam 70-742, Chapter 8 -
Implementing Active Directory
Certificate Services Fully solved
a. Confidentiality
b. Nonrepudiation
Reference: - correct answer ✔✔Which of the following are services provided by a PKI? (Choose
all that apply.)
a. Confidentiality
b. Nonrepudiation
c. Authorization
d. Antivirus
c. secret key
Reference: - correct answer ✔✔Which of the following is used at both ends of the cryptography
process (encryption and decryption) and must be known by both parties?
a. public key
b. private key
c. secret key
d. digital signature
, False - correct answer ✔✔A PKI is based on symmetric cryptography. True or False?
b. Asymmetric cryptography only - correct answer ✔✔If you want the most security, which of
the following should you use?
a. Symmetric cryptography only
b. Asymmetric cryptography only
c. A combination of symmetric and asymmetric cryptography only.
d. secret key cryptography
c. Sophie sends Camille her public key
Reference: - correct answer ✔✔Camille and Sophie want to engage in secure communication.
Both hold a public/private key pair. Camille wants to send an encrypted message to Sophie.
Which of the following happens first?
a. Camille encrypts the message with her public key.
b. Camille sends Sophie her public key
c. Sophie sends Camille her public key
d. Camille encrypts the message with her private key.
Implementing Active Directory
Certificate Services Fully solved
a. Confidentiality
b. Nonrepudiation
Reference: - correct answer ✔✔Which of the following are services provided by a PKI? (Choose
all that apply.)
a. Confidentiality
b. Nonrepudiation
c. Authorization
d. Antivirus
c. secret key
Reference: - correct answer ✔✔Which of the following is used at both ends of the cryptography
process (encryption and decryption) and must be known by both parties?
a. public key
b. private key
c. secret key
d. digital signature
, False - correct answer ✔✔A PKI is based on symmetric cryptography. True or False?
b. Asymmetric cryptography only - correct answer ✔✔If you want the most security, which of
the following should you use?
a. Symmetric cryptography only
b. Asymmetric cryptography only
c. A combination of symmetric and asymmetric cryptography only.
d. secret key cryptography
c. Sophie sends Camille her public key
Reference: - correct answer ✔✔Camille and Sophie want to engage in secure communication.
Both hold a public/private key pair. Camille wants to send an encrypted message to Sophie.
Which of the following happens first?
a. Camille encrypts the message with her public key.
b. Camille sends Sophie her public key
c. Sophie sends Camille her public key
d. Camille encrypts the message with her private key.