Answers
1. A business wants to use keys issued by a trusted C. Version
third party to demonstrate to potential customers D. Thumbprin
that it is a legitimate organization. Which key is
used to sign the certificate issued to the
business?
A. Private key of the root CA
B. Public key of the root CA
C. Private key of the company
D. Public key of the company
2. A business wants to use keys issued by a trusted
third party to demonstrate it is a legitimate
organization to potential customers. Which
key should the business send to potential
customers to prove its identity?
A. Private key of the root CA
B. Public key of the root CA
C. Private key of the company
D. Public key of the company
3. What should an administrator use to import
and ex- port all items written using X.509
that are part of a chain of trust?
A. CER
B. Public Key Cryptography Standard (PKCS) #7
C. Public Key Cryptography Standard (PKCS) #12
D. RTF
4. Which field displays the hash, or digest, of the
certifi- cate in an X.509 certificate?
A. Subject
B. Issuer
1/
29
, Pre-Assessment Intro To Cryptography - D334 With Correct
Answers
Private key of the root CA
Public key of the company
Public Key Cryptography Standard (PKCS) #12
Thumbprint
2/
29
, Pre-Assessment Intro To Cryptography - D334 With Correct
Answers
5. Which certificate management process Issued
involves key recovery?
A. Initialization
B. Issued
C. Cancellation
D. Hold
6. Which task does a root CA perform before Signing it with its
publishing its own certificate? private key
A. Encrypting it with its private key
B. Encrypting it with its public key
C. Signing it with its private key
D. Signing it with its public key
7. Which algorithm is used to generate the thumbprint of SHA-1
a certificate?
A. RSA
B. 3DES
C. AES
D. SHA-1
8. Large volumes of plaintext need to be distribute by
encrypted, and the encryption keys need to using
be securely distributed. Which approach symmetric
should be used for encryption and keys
distribution?
A. Encrypt by using symmetric keys and
distribute by using asymmetric keys
B. Encrypt by using asymmetric keys and
distribute by using symmetric keys
C. Encrypt by using symmetric keys and
3/
29