Search Header Logo

Public Key Infrastructure

Authored by Usama Yehia Ibrahim

Computers

Professional Development

Used 37+ times

Public Key Infrastructure
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are asked by the senior system administrator to refresh the SSL certificates on the web servers. The process is to generate a certificate signing request (CSR), send it to a third party to be signed, and then apply the return information to the CSR. What is this an example of?

Pinning

Borrowed authority

Third-party trust model

Stapling

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A certificate authority consists of which of the following?

Hardware and software

Policies and procedures

People who manage certificates

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your manager wants you to review the company’s internal PKI system’s CPS for applicability and verification and to ensure that it meets current needs. What are you most likely to focus on?

Revocations

Trust level provided to users

Key entropy

How the keys are stored

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are preparing an e-mail to send to a colleague at work, and because the message information is sensitive, you decide you should encrypt it. When you attempt to apply the certificate that you have for the colleague, the encryption fails. The certificate was listed as still valid for another year, and the certificate authority is still trusted and working. What happened to this user’s key?

It was using the wrong algorithm.

You are querying the incorrect certificate authority

It was revoked

The third-party trust model failed.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a requirement for a CRL?

It must have the e-mail addresses of all the certificate owners. 

It must contain a list of all expired certificates.

It must contain information about all the subdomains covered by the CA.

It must be posted to a public directory.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does OCSP do?

It reviews the CRL for the client and provides a status about the certificate being validated.

 It outlines the details of a certificate authority, including how identities are verified, the steps the CA follows to generate certificates, and why the CA can be trusted.

It provides for a set of values to be attached to the certificate.

It provides encryption for digital signatures.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The X.509 standard applies to which of the following?

SSL providers

Digital certificates

Certificate revocation lists

Public key infrastructure

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?