and Answers 100% Pass
A business wants to use keys issued by a trusted third party to demonstrate to potential customers
that it is a legitimate organization. Which key is used to sign the certificate issued to the
business? ✔✔Private key of the root CA
A business wants to use keys issued by a trusted third party to demonstrate it is a legitimate
organization to potential customers. Which key should the business send to potential customers
to prove its identity? ✔✔Public key of the company
What should an administrator use to import and export all items written using X.509 that are part
of a chain of trust? ✔✔Public Key Cryptography Standard (PKCS) #12
Which field displays the hash, or digest, of the certificate in an X.509 certificate?
✔✔Thumbprint
Which certificate management process involves key recovery? ✔✔Issued
, Which task does a root CA perform before publishing its own certificate? ✔✔Signing it with its
private key
Which algorithm is used to generate the thumbprint of a certificate? ✔✔SHA-1
Large volumes of plaintext need to be encrypted, and the encryption keys need to be securely
distributed. Which approach should be used for encryption and distribution? ✔✔Encrypt by
using symmetric keys and distribute by using asymmetric keys
What is the role of a key in asymmetric encryption and decryption? ✔✔A public key is used for
encryption, and a private key is used for decryption.
A security analyst is validating the integrity and authenticity of a data transaction. Which PKI
component is being used? ✔✔Digital signature
Which PKI component generates digital certificates? ✔✔Certificate authority (CA)
What is the maximum length (in bits) of encryption keys used by the WEP protocol? ✔✔40