Review Questions

belchertownshuffleAI and Robotics

Nov 21, 2013 (3 years and 6 months ago)

2,854 views

Review Questions

1.

The strongest technology that would assure Alice that Bob is the sender of a
message is a(n) ________.

A.

digital signature

B.

digital certificate

C.

hash

D.

encrypted signature

2.

A digital certificate associates ________.

A.

the user’s identity with
their public key

B.

a user’s private key with the public key

C.

a digital signature with a user

D.

a private key with a digital signature

3.

An entity that issues digital certificates for others is a(n) ________.

A.

Certificate Authority (CA)

B.

Signature Authority (SA)

C.

Di
gital Signer (DS)

D.

Certificate Signatory (CS)

4.

A list of approved digital certificates is called a(n) ________.

A.

Digital Certificate Authorization Form (DCAF)

B.

Certificate Repository (CR)

C.

Authorized Digital Signature

D.

Digital Signature Permitted Authorization

(DSPA)

5.

Digital certificates can be used for each of the following except ________.

A.

Verify the identity of clients and servers on the Web

B.

Encrypt messages for secure e
-
mail communications

C.

Verify the authenticity of the Registration Authorizer

D.

Encrypt cha
nnels to provide secure communication between clients and servers

6.

In order to ensure a secure cryptographic connection between a Web browser and
a Web server a _____ digital certificate would be used.

A.

personal digital certificate

B.

Web digital certificate

C.

p
ersonal Web certificate determining the integrity of a message

D.

server digital certificate

7.

A digital certificate that turns the address bar green is a(n) ________.

A.

Extended Validation SSL Certificate

B.

Web Server Advanced Certificate

C.

Personal Web
-
Client Certi
ficate

D.

Internet Standard Certificate

8.

Digital certificates that are split into two parts are known as _____ certificates.

A.

binary

B.

extended

C.

dual
-
sided

D.

split

9.

Which of the following is NOT a field of an X.509 certificate?

A.

validity period

B.

serial number

C.

signature

D.

CA expiration code

10.

Public key infrastructure (PKI) ________.

A.

protects cipherkey cryptography

B.

generates public/private keys automatically

C.

is the management of digital certificates

D.

creates private key cryptography

11.

Public
-
Key Cryptography Standar
ds (PKCS) ________.

A.

have been replaced by PKI

B.

are widely accepted in the industry

C.

define how hashing algorithms are created

D.

are used to create public keys only

12.

The ______ trust model supports CA.

A.

direct

B.

indirect

C.

third party

D.

remote

13.

Hierarchical trust
models are best suited for ________.

A.

I
nternet usage

B.

single organizations

C.

settings with multiple CAs and RAs

D.

organizations with fewer than 10 users

14.

A(n) _____ is a published set of rules that govern the operation of a PKI.

A.

Certificate Practice Statement
(CPS)

B.

Signature Resource Guide (SRG)

C.

Enforcement Certificate

D.

certificate policy (CP)

15.

Each of the following is a part of the certificate life cycle except ________.

A.

Creation

B.

Revocation

C.

Authorization

D.

Expiration

16.

Keys can be stored in each of the following e
xcept ________.

A.

e
mbedded in digital certificates

B.

stored on the user’s local system

C.

in tokens

D.

in hashes

17.

_____ refers to a situation in which keys are managed by a third
-
party, such as a
trusted CA.

A.

Key escrow

B.

Trusted key authority

C.

Key authorization

D.

Remote
key administration

18.

A cryptographic transport protocol for FTP is ________.

A.

RAS
-
256

B.

MIME

C.


UNIX Remote Shell Encryption (UNIX
-
RSE)

D.

Secure Sockets Layer (SSL)

19.

What is the cryptographic transport protocol that is used most often to secure Web
transactions?

A.

H
TTPS

B.

SHTTP

C.

PPPTPoE

D.

MD
-
17

20.

Which is the most secure VPN cryptographic transport protocol?

A.

LPTP2

B.

PTP

C.

IPsec

D.

Hash
-
32