Pre-Assessment Intro to Cryptography - D334 EXAM
QUESTIONS WITH CORRECT ANSWERS
A |business |wants |to |use |keys |issued |by |a |trusted |third |party |to |demonstrate |to |potential |
customers |that |it |is |a |legitimate |organization. |Which |key |is |used |to |sign |the |certificate |issued |
to |the |business?
A. |Private |key |of |the |root |CA
B. |Public |key |of |the |root |CA
C. |Private |key |of |the |company
D. |Public |key |of |the |company
Private |key |of |the |root |CA
A |business |wants |to |use |keys |issued |by |a |trusted |third |party |to |demonstrate |it |is |a |legitimate |
organization |to |potential |customers. |Which |key |should |the |business |send |to |potential |
customers |to |prove |its |identity?
A. |Private |key |of |the |root |CA
B. |Public |key |of |the |root |CA
C. |Private |key |of |the |company
D. |Public |key |of |the |company
Public |key |of |the |company
What |should |an |administrator |use |to |import |and |export |all |items |written |using |X.509 |that |are |
part |of |a |chain |of |trust?
A. |CER
B. |Public |Key |Cryptography |Standard |(PKCS) |#7
C. |Public |Key |Cryptography |Standard |(PKCS) |#12
D. |RTF
Public |Key |Cryptography |Standard |(PKCS) |#12
Which |field |displays |the |hash, |or |digest, |of |the |certificate |in |an |X.509 |certificate?
A. |Subject
B. |Issuer
C. |Version
D. |Thumbprint
Thumbprint
, Which |certificate |management |process |involves |key |recovery?
A. |Initialization
B. |Issued
C. |Cancellation
D. |Hold
Issued
Which |task |does |a |root |CA |perform |before |publishing |its |own |certificate?
A. |Encrypting |it |with |its |private |key
B. |Encrypting |it |with |its |public |key
C. |Signing |it |with |its |private |key
D. |Signing |it |with |its |public |key
Signing |it |with |its |private |key
Which |algorithm |is |used |to |generate |the |thumbprint |of |a |certificate?
A. |RSA
B. |3DES
C. |AES
D. |SHA-1
SHA-1
Large |volumes |of |plaintext |need |to |be |encrypted, |and |the |encryption |keys |need |to |be |securely
|distributed. |Which |approach |should |be |used |for |encryption |and |distribution?
A. |Encrypt |by |using |symmetric |keys |and |distribute |by |using |asymmetric |keys
B. |Encrypt |by |using |asymmetric |keys |and |distribute |by |using |symmetric |keys
C. |Encrypt |by |using |symmetric |keys |and |distribute |by |using |symmetric |keys
D. |Encrypt |by |using |asymmetric |keys |and |distribute |by |using |asymmetric |keys
Encrypt |by |using |symmetric |keys |and |distribute |by |using |asymmetric |keys
What |is |the |role |of |a |key |in |asymmetric |encryption |and |decryption?
A. |A |public |key |is |used |for |both |encryption |and |decryption.
B. |A |private |key |is |used |for |both |encryption |and |decryption.
C. |A |public |key |is |used |for |encryption, |and |a |private |key |is |used |for |decryption.
D. |A |private |key |is |used |for |encryption, |and |a |public |key |is |used |for |decryption.
A |public |key |is |used |for |encryption, |and |a |private |key |is |used |for |decryption.
QUESTIONS WITH CORRECT ANSWERS
A |business |wants |to |use |keys |issued |by |a |trusted |third |party |to |demonstrate |to |potential |
customers |that |it |is |a |legitimate |organization. |Which |key |is |used |to |sign |the |certificate |issued |
to |the |business?
A. |Private |key |of |the |root |CA
B. |Public |key |of |the |root |CA
C. |Private |key |of |the |company
D. |Public |key |of |the |company
Private |key |of |the |root |CA
A |business |wants |to |use |keys |issued |by |a |trusted |third |party |to |demonstrate |it |is |a |legitimate |
organization |to |potential |customers. |Which |key |should |the |business |send |to |potential |
customers |to |prove |its |identity?
A. |Private |key |of |the |root |CA
B. |Public |key |of |the |root |CA
C. |Private |key |of |the |company
D. |Public |key |of |the |company
Public |key |of |the |company
What |should |an |administrator |use |to |import |and |export |all |items |written |using |X.509 |that |are |
part |of |a |chain |of |trust?
A. |CER
B. |Public |Key |Cryptography |Standard |(PKCS) |#7
C. |Public |Key |Cryptography |Standard |(PKCS) |#12
D. |RTF
Public |Key |Cryptography |Standard |(PKCS) |#12
Which |field |displays |the |hash, |or |digest, |of |the |certificate |in |an |X.509 |certificate?
A. |Subject
B. |Issuer
C. |Version
D. |Thumbprint
Thumbprint
, Which |certificate |management |process |involves |key |recovery?
A. |Initialization
B. |Issued
C. |Cancellation
D. |Hold
Issued
Which |task |does |a |root |CA |perform |before |publishing |its |own |certificate?
A. |Encrypting |it |with |its |private |key
B. |Encrypting |it |with |its |public |key
C. |Signing |it |with |its |private |key
D. |Signing |it |with |its |public |key
Signing |it |with |its |private |key
Which |algorithm |is |used |to |generate |the |thumbprint |of |a |certificate?
A. |RSA
B. |3DES
C. |AES
D. |SHA-1
SHA-1
Large |volumes |of |plaintext |need |to |be |encrypted, |and |the |encryption |keys |need |to |be |securely
|distributed. |Which |approach |should |be |used |for |encryption |and |distribution?
A. |Encrypt |by |using |symmetric |keys |and |distribute |by |using |asymmetric |keys
B. |Encrypt |by |using |asymmetric |keys |and |distribute |by |using |symmetric |keys
C. |Encrypt |by |using |symmetric |keys |and |distribute |by |using |symmetric |keys
D. |Encrypt |by |using |asymmetric |keys |and |distribute |by |using |asymmetric |keys
Encrypt |by |using |symmetric |keys |and |distribute |by |using |asymmetric |keys
What |is |the |role |of |a |key |in |asymmetric |encryption |and |decryption?
A. |A |public |key |is |used |for |both |encryption |and |decryption.
B. |A |private |key |is |used |for |both |encryption |and |decryption.
C. |A |public |key |is |used |for |encryption, |and |a |private |key |is |used |for |decryption.
D. |A |private |key |is |used |for |encryption, |and |a |public |key |is |used |for |decryption.
A |public |key |is |used |for |encryption, |and |a |private |key |is |used |for |decryption.