Question: Which assurance does using public-key cryptography for digital signatures provide?
Answer Options:
Privacy protection
Mutual authentication
Integrity
Confidentiality
Answer: Integrity
Question: What should an administrator do to replace a revoked certificate?
Answer Options:
Renew the certificate
Restore the certificate
Update the certificate
Reissue the certificate
Answer: Reissue the certificate
Question: A company wants to use two-factor authentication to reduce the risk of network compromise if a password is cracked. Which factor do the keys on a user’s certificate represent?
Answer Options:
Something the user knows
Something the user has
Something the user is
Somewhere the user is
Answer: Something the user has
Question: Which PKI component manages the cancellation of digital certificates?
Answer Options:
Certificate signing request (CSR)
Certificate policy (CP)
Certificate authority (CA)
Certificate revocation list (CRL)
Answer: Certificate revocation list (CRL)
Question: What should be done on an end user’s computer to validate a certificate?
Answer Options:
Import the user’s public key into the private certificate store
Import the issued certificate into the trusted root certificate store
Import the root certificate into the trusted root certificate store
Import the user’s private key into the private certificate store
Answer: Import the root certificate into the trusted root certificate store
Question: Which block size (in bytes) does AES support?
Answer Options:
16
24
32
64
Answer: 16
Question: What is used to maintain confidentiality in WPA2?
Answer Options:
PEAP
EAP
TKIP
AES
Answer: AES
Question: Which mechanism associated with WEP is used to ensure that the same plaintext value will result in a different ciphertext?
Answer Options:
Global encryption key
Block algorithm
Bit flipping
Initialization vector
Answer: Initialization vector
Question: Two people want to use a symmetric key to encrypt data. The person who created the key needs to transfer it to the other person, ensuring no one else can decrypt the key. Which key should the person who created the symmetric key use?
Answer Options:
Recipient’s private key
Recipient’s public key
Sender’s public key
Sender’s private key
Answer: Recipient’s public key
Question: Which mechanism is used by WEP to implement encryption?
Answer Options:
SHA
RSA
RC4
MD5
Answer: RC4
Question: What is the primary cryptographic mechanism that provides the information equivalent to publishing a certificate revocation list (CRL)?
Answer Options:
Personal Information Exchange (PFX)
Authority Information Access (AIA)
Public-Key Cryptography Standards (PKCS)
Online Certificate Status Protocol (OCSP)
Answer: Online Certificate Status Protocol (OCSP)
Question: Which encryption is used in WEP?
Answer Options:
40-bit RC4
128-bit RC4
128-bit AES
256-bit AES
Answer: 128-bit RC4
Question: Which certificate format is text-based?
Answer Options:
Rivest-Shamir-Adleman (RSA)
Distinguished Encoding Rules (DER)
Privacy Enhanced Mail (PEM)
Public Key Infrastructure (PKI)
Answer: Privacy Enhanced Mail (PEM)
Question: Which main stage of certificate management involves certificate revocation?
Answer Options:
Hold
Initialization
Cancellation
Issued
Answer: Cancellation
Question: Which certificate format is used for distributing certificates?
Answer Options:
X.509
Public Key Cryptography Standard (PKCS) #7
Public Key Cryptography Standard (PKCS) #10
X.500
Answer: Public Key Cryptography Standard (PKCS) #7
Question: Which binary encoding format is used for a certificate revocation list (CRL)?
Answer Options:
Distinguished Encoding Rules (DER)
American Standard Code for Information Interchange (ASCII)
Privacy Enhanced Mail (PEM)
Extensible Markup Language (XML)
Answer: Distinguished Encoding Rules (DER)