UPDATED ACTUAL Exam Questions and
CORRECT Answers
Which is an IPsec protocol that authenticates that packets received were sent from the source?
a. PXP
b. DER
c. CER
d. AH - CORRECT ANSWER - d. AH (Authentication Header)
What is the name of the fields in an X.509 digital certificate that are used when the parties
negotiate a secure connection?
a. Electronic Code Book (ECB) repositories
b. Certificate attributes
c. CTR
d. PFX - CORRECT ANSWER - b. Certificate attributes
What entity calls in crypto modules to perform cryptographic tasks?
a. Certificate Authority (CA)
b. Crypto service provider
c. Intermediate CA
d. OCSP - CORRECT ANSWER - b. Crypto service provider
_________________ are symmetric keys to encrypt and decrypt information exchanged during
the session and to verify its integrity.
a. Digital digests
b. Encrypted signatures
c. Session keys
, d. Digital certificates - CORRECT ANSWER - c. Session keys
What is the name of the device protected by a digital certificate?
a. CN
b. TLXS
c. RCR
d. V2X2 - CORRECT ANSWER - a. CN
What is the strongest technology that would assure Alice that Bob is the sender of a message?
a. Digital signature
b. Encrypted signature
c. Digest
d. Digital certificate - CORRECT ANSWER - a. Digital signature
Olivia is explaining to a friend about digital certificates. Her friend asks what two entities a
digital certificate associates or binds together.
What would Olivia say?
a. The users' symmetric key with the public key
b. The users' public key with their private key
c. The users' identity with their public key
d. A private key with a digital signature - CORRECT ANSWER - c. The users' identity
with their public key
Which of the following can a digital certificate NOT be used for?
a. To encrypt messages for secure email communications
b. To encrypt channels to provide secure communication between clients and servers
c. To verify the authenticity of the CA
d. To verify the identity of clients and servers on the web - CORRECT ANSWER - c. To
verify the authenticity of the CA