Question: Which assurance does using public-key cryptography for digital signatures provide?

Answer Options:
Privacy protection
Mutual authentication
Integrity
Confidentiality

Answer: Integrity

 

Question: What should an administrator do to replace a revoked certificate?

Answer Options:
Renew the certificate
Restore the certificate
Update the certificate
Reissue the certificate

Answer: Reissue the certificate

 

Question: A company wants to use two-factor authentication to reduce the risk of network compromise if a password is cracked. Which factor do the keys on a user’s certificate represent?

Answer Options:
Something the user knows
Something the user has
Something the user is
Somewhere the user is

Answer: Something the user has

 

Question: Which PKI component manages the cancellation of digital certificates?

Answer Options:
Certificate signing request (CSR)
Certificate policy (CP)
Certificate authority (CA)
Certificate revocation list (CRL)

Answer: Certificate revocation list (CRL)

 

Question: What should be done on an end user’s computer to validate a certificate?

Answer Options:
Import the user’s public key into the private certificate store
Import the issued certificate into the trusted root certificate store
Import the root certificate into the trusted root certificate store
Import the user’s private key into the private certificate store

Answer: Import the root certificate into the trusted root certificate store

 

Question: Which block size (in bytes) does AES support?

Answer Options:
16
24
32
64

Answer: 16

 

Question: What is used to maintain confidentiality in WPA2?

Answer Options:
PEAP
EAP
TKIP
AES

Answer: AES

 

Question: Which mechanism associated with WEP is used to ensure that the same plaintext value will result in a different ciphertext?

Answer Options:
Global encryption key
Block algorithm
Bit flipping
Initialization vector

Answer: Initialization vector

 

Question: Two people want to use a symmetric key to encrypt data. The person who created the key needs to transfer it to the other person, ensuring no one else can decrypt the key. Which key should the person who created the symmetric key use?

Answer Options:
Recipient’s private key
Recipient’s public key
Sender’s public key
Sender’s private key

Answer: Recipient’s public key

 

Question: Which mechanism is used by WEP to implement encryption?

Answer Options:
SHA
RSA
RC4
MD5

Answer: RC4

 

Question: What is the primary cryptographic mechanism that provides the information equivalent to publishing a certificate revocation list (CRL)?

Answer Options:
Personal Information Exchange (PFX)
Authority Information Access (AIA)
Public-Key Cryptography Standards (PKCS)
Online Certificate Status Protocol (OCSP)

Answer: Online Certificate Status Protocol (OCSP)

 

Question: Which encryption is used in WEP?

Answer Options:
40-bit RC4
128-bit RC4
128-bit AES
256-bit AES

Answer: 128-bit RC4

 

Question: Which certificate format is text-based?

Answer Options:
Rivest-Shamir-Adleman (RSA)
Distinguished Encoding Rules (DER)
Privacy Enhanced Mail (PEM)
Public Key Infrastructure (PKI)

Answer: Privacy Enhanced Mail (PEM)

 

Question: Which main stage of certificate management involves certificate revocation?

Answer Options:
Hold
Initialization
Cancellation
Issued

Answer: Cancellation

 

Question: Which certificate format is used for distributing certificates?

Answer Options:
X.509
Public Key Cryptography Standard (PKCS) #7
Public Key Cryptography Standard (PKCS) #10
X.500

Answer: Public Key Cryptography Standard (PKCS) #7

 

Question: Which binary encoding format is used for a certificate revocation list (CRL)?

Answer Options:
Distinguished Encoding Rules (DER)
American Standard Code for Information Interchange (ASCII)
Privacy Enhanced Mail (PEM)
Extensible Markup Language (XML)

Answer: Distinguished Encoding Rules (DER)