D334 CRYPTOGRAPHY
1. A business wants to use keys issued by a trusted third party
to demonstrate to potential customers that it is a legitimate
organization. Which key is used to sign the certificate issued
to the business?
A. Private key of the root CA B. Public key of the root CA
C. Private key of the company
D. Public key of the company: Private key of the root CA
2. A business wants to use keys issued by a trusted third party
to demonstrate it is a legitimate organization to potential
customers. Which key should the business send to potential
customers to prove its identity?
A. Private key of the root CA B. Public key of the root CA
C. Private key of the company
D. Public key of the company: Public key of the company
3. What should an administrator use to import and export all
items written using X.509 that are part of a chain of trust?
A. CER
B. Public Key Cryptography Standard (PKCS) #7
C. Public Key Cryptography Standard (PKCS) #12
D. RTF: Public Key Cryptography Standard (PKCS) #12
,4. Which field displays the hash, or digest, of the certificate in
an X.509 certificate?
A. Subject B. Issuer C. Version
D. Thumbprint: Thumbprint
5. Which certificate management process involves key
recovery? A. Initialization
B. Issued
C. Cancellation
D. Hold: Issued
6. Which task does a root CA perform before publishing its
own certificate? A. Encrypting it with its private key
B. Encrypting it with its public key
C. Signing it with its private key
D. Signing it with its public key: Signing it with its private key
7. Which algorithm is used to generate the thumbprint of a
certificate? A. RSA
B. 3DES
, C. AES
D. SHA-1: SHA-1
8. Large volumes of plaintext need to be encrypted, and the
encryption keys need to be securely distributed. Which
approach should be used for encryp- tion and distribution?
A. Encrypt by using symmetric keys and distribute by using
asymmetric keys B. Encrypt by using asymmetric keys and
distribute by using symmetric keys C. Encrypt by using
symmetric keys and distribute by using symmetric keys D.
Encrypt by using asymmetric keys and distribute by using
asymmetric keys: Encrypt by using symmetric keys and
distribute by using asymmetric keys
9. What is the role of a key in asymmetric encryption and
decryption?
A. A public key is used for both encryption and decryption.
B. A private key is used for both encryption and decryption.
C. A public key is used for encryption, and a private key is
used for decryption. D. A private key is used for encryption,
and a public key is used for decryp- tion.: A public key is used
for encryption, and a private key is used for decryption.
1. A business wants to use keys issued by a trusted third party
to demonstrate to potential customers that it is a legitimate
organization. Which key is used to sign the certificate issued
to the business?
A. Private key of the root CA B. Public key of the root CA
C. Private key of the company
D. Public key of the company: Private key of the root CA
2. A business wants to use keys issued by a trusted third party
to demonstrate it is a legitimate organization to potential
customers. Which key should the business send to potential
customers to prove its identity?
A. Private key of the root CA B. Public key of the root CA
C. Private key of the company
D. Public key of the company: Public key of the company
3. What should an administrator use to import and export all
items written using X.509 that are part of a chain of trust?
A. CER
B. Public Key Cryptography Standard (PKCS) #7
C. Public Key Cryptography Standard (PKCS) #12
D. RTF: Public Key Cryptography Standard (PKCS) #12
,4. Which field displays the hash, or digest, of the certificate in
an X.509 certificate?
A. Subject B. Issuer C. Version
D. Thumbprint: Thumbprint
5. Which certificate management process involves key
recovery? A. Initialization
B. Issued
C. Cancellation
D. Hold: Issued
6. Which task does a root CA perform before publishing its
own certificate? A. Encrypting it with its private key
B. Encrypting it with its public key
C. Signing it with its private key
D. Signing it with its public key: Signing it with its private key
7. Which algorithm is used to generate the thumbprint of a
certificate? A. RSA
B. 3DES
, C. AES
D. SHA-1: SHA-1
8. Large volumes of plaintext need to be encrypted, and the
encryption keys need to be securely distributed. Which
approach should be used for encryp- tion and distribution?
A. Encrypt by using symmetric keys and distribute by using
asymmetric keys B. Encrypt by using asymmetric keys and
distribute by using symmetric keys C. Encrypt by using
symmetric keys and distribute by using symmetric keys D.
Encrypt by using asymmetric keys and distribute by using
asymmetric keys: Encrypt by using symmetric keys and
distribute by using asymmetric keys
9. What is the role of a key in asymmetric encryption and
decryption?
A. A public key is used for both encryption and decryption.
B. A private key is used for both encryption and decryption.
C. A public key is used for encryption, and a private key is
used for decryption. D. A private key is used for encryption,
and a public key is used for decryp- tion.: A public key is used
for encryption, and a private key is used for decryption.