Public Key Infrastructure

Public Key Infrastructure

Professional Development

10 Qs

quiz-placeholder

Similar activities

CCNP-Sec-SISAS-Pre-Assessment

CCNP-Sec-SISAS-Pre-Assessment

Professional Development

10 Qs

Bootcamp DTSFGA Modul 14 CCT

Bootcamp DTSFGA Modul 14 CCT

Professional Development

5 Qs

Microsoft Intune

Microsoft Intune

Professional Development

10 Qs

70-742 Quiz 1

70-742 Quiz 1

Professional Development

10 Qs

SEC+ Domain 6

SEC+ Domain 6

Professional Development

8 Qs

Lesson 6: Implementing Public Key Infrastructure

Lesson 6: Implementing Public Key Infrastructure

Professional Development

11 Qs

Tips Singkat & Praktis di Dunia Siber

Tips Singkat & Praktis di Dunia Siber

Professional Development

10 Qs

Sec+ Quiz - 1

Sec+ Quiz - 1

Professional Development

15 Qs

Public Key Infrastructure

Public Key Infrastructure

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Usama Yehia Ibrahim

Used 36+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are asked by the senior system administrator to refresh the SSL certificates on the web servers. The process is to generate a certificate signing request (CSR), send it to a third party to be signed, and then apply the return information to the CSR. What is this an example of?

Pinning

Borrowed authority

Third-party trust model

Stapling

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A certificate authority consists of which of the following?

Hardware and software

Policies and procedures

People who manage certificates

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your manager wants you to review the company’s internal PKI system’s CPS for applicability and verification and to ensure that it meets current needs. What are you most likely to focus on?

Revocations

Trust level provided to users

Key entropy

How the keys are stored

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are preparing an e-mail to send to a colleague at work, and because the message information is sensitive, you decide you should encrypt it. When you attempt to apply the certificate that you have for the colleague, the encryption fails. The certificate was listed as still valid for another year, and the certificate authority is still trusted and working. What happened to this user’s key?

It was using the wrong algorithm.

You are querying the incorrect certificate authority

It was revoked

The third-party trust model failed.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a requirement for a CRL?

It must have the e-mail addresses of all the certificate owners. 

It must contain a list of all expired certificates.

It must contain information about all the subdomains covered by the CA.

It must be posted to a public directory.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does OCSP do?

It reviews the CRL for the client and provides a status about the certificate being validated.

 It outlines the details of a certificate authority, including how identities are verified, the steps the CA follows to generate certificates, and why the CA can be trusted.

It provides for a set of values to be attached to the certificate.

It provides encryption for digital signatures.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The X.509 standard applies to which of the following?

SSL providers

Digital certificates

Certificate revocation lists

Public key infrastructure

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?