MGT) Exam 2025 With 100% correct
Answers
A large certificate-issuing company lost its reputation due to poor business practices. Its higher
signing authority revoked the ability to issue new certificates, and browsers now show it as
invalid. What describes the position that the company once had but has now lost?
A. Root Certificate Authority
B. Certificate Signing Request
C. Certificate Authority
D. Certificate Revocation List - CORRECT ANSWER✔✔C. Certificate Authority
Why might a company want a longer key length?
A. To improve the performance of the algorithm
B. To slow down the initial encryption
C. To increase the chances of the ciphertext cracking
D. To decrease the chances of the ciphertext cracking - CORRECT ANSWER✔✔D. To decrease the
chances of the ciphertext cracking
A coffee chain hired a marketing firm to set up a website that allows sign-ups. However, after
running a test on the website, an error message in the browser stated that the connection was
insecure. What framework should the marketing firm use to ensure this error message does not
show up?
A. Public key infrastructure
B. Certificate authority
C. Cryptanalysis
D. Typosquatting - CORRECT ANSWER✔✔A. Public key infrastructure
, A chief executive officer pushed back against the information technology department's proposal
to set up disk encryption on all devices. What BEST describes why the CEO should approve the
proposal instead of pushing back against it?
A. Disk encryption protects stolen devices from data theft.
B. Disk encryption slows down a computer's performance.
C. The cost of disk encryption is not worth incurring.
D. The company does not have enough sensitive data. - CORRECT ANSWER✔✔A. Disk
encryption protects stolen devices from data theft.
A small development company just set up a web server and must ensure a secure customer
connection. Regarding digital certificates, what is a file containing the information that the
subject wants to use in the certificate, including its public key?
A. CA
B. CSR
C. CRL
D. PKI - CORRECT ANSWER✔✔B. CSR
A recent security flaw allowed a malicious actor to access sensitive data even though the data
never left the server and there is full drive encryption. Which data state did the malicious actor
MOST likely compromise?
A. In transit
B. At rest
C. In use
D. Through Bluetooth - CORRECT ANSWER✔✔C. In use
A news reporter received an anonymous message containing a potential Pulitzer Prize-winning
story. However, the anonymous sender requested the reporter set up a communication system